Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/mozjs78-78.4.0/build/clang-plugin/alpha/tests/TestTempRefPtr.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/alpha/TempRefPtrChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/alpha/TempRefPtrChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.h
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.h
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/MozsearchIndexer.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.h
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/NonParameterTestCases.h
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestAssertWithAssignment.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestBadImplicitConversionCtor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestCanRunScript.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestCustomHeap.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestDanglingOnTemporary.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestExplicitOperatorBool.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestGlobalClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestHeapClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestInheritTypeAnnotationsFromTemplateArgs.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestKungFuDeathGrip.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestLoadLibraryUsage.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMultipleAnnotations.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMustOverride.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMustReturnFromCaller.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMustUse.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNANTestingExpr.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNANTestingExprC.c
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNeedsNoVTableType.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoAddRefReleaseOnReturn.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoArithmeticExprInArgument.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoAutoType.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoDuplicateRefCntMember.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoExplicitMoveConstructor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoNewThreadsChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoPrincipalGetUri.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoRefcountedInsideLambdas.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoUsingNamespaceMozillaJava.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonHeapClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonMemMovable.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonMemMovableStd.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonMemMovableStdAtomic.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonParameterChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonTemporaryClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonTrivialTypeInFfi.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestOverrideBaseCall.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestOverrideBaseCallAnnotation.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestParamTraitsEnum.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestRefCountedCopyConstructor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestSprintfLiteral.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestStackClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestStaticLocalClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestTemporaryClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestTrivialCtorDtor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestTrivialDtor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ArithmeticArgChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ArithmeticArgChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/AssertAssignmentChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/AssertAssignmentChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/BaseCheck.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CanRunScriptChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/CanRunScriptChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomAttributes.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomAttributes.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomMatchers.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomTypeAnnotation.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomTypeAnnotation.h
Examining data/mozjs78-78.4.0/build/clang-plugin/DanglingOnTemporaryChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/DanglingOnTemporaryChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/DiagnosticsMatcher.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/DiagnosticsMatcher.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitImplicitChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitImplicitChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitOperatorBoolChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitOperatorBoolChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/FopenUsageChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/FopenUsageChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/KungFuDeathGripChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/KungFuDeathGripChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/LoadLibraryUsageChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/LoadLibraryUsageChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MemMoveAnnotation.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MozCheckAction.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MozillaTidyModule.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustOverrideChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustOverrideChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MustReturnFromCallerChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustReturnFromCallerChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MustUseChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustUseChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NaNExprChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NaNExprChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NeedsNoVTableTypeChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NeedsNoVTableTypeChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAddRefReleaseOnReturnChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAddRefReleaseOnReturnChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAutoTypeChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAutoTypeChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoDuplicateRefCntMemberChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoDuplicateRefCntMemberChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoExplicitMoveConstructorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoExplicitMoveConstructorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoNewThreadsChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoNewThreadsChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoPrincipalGetURI.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoPrincipalGetURI.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoUsingNamespaceMozillaJavaChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoUsingNamespaceMozillaJavaChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableMemberChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableMemberChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableTemplateArgChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableTemplateArgChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonParamInsideFunctionDeclChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonParamInsideFunctionDeclChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonTrivialTypeInFfiChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonTrivialTypeInFfiChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallUsageChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallUsageChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ParamTraitsEnumChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ParamTraitsEnumChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/RecurseGuard.h
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedCopyConstructorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedCopyConstructorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedInsideLambdaChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedInsideLambdaChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ScopeChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ScopeChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/SprintfLiteralChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/SprintfLiteralChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/StmtToBlockMap.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ThirdPartyPaths.h
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialCtorDtorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialCtorDtorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialDtorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialDtorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/Utils.h
Examining data/mozjs78-78.4.0/build/clang-plugin/VariableUsageHelpers.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/VariableUsageHelpers.h
Examining data/mozjs78-78.4.0/build/clang-plugin/plugin.h
Examining data/mozjs78-78.4.0/build/macosx/permissions/chown_revert.c
Examining data/mozjs78-78.4.0/build/macosx/permissions/chown_root.c
Examining data/mozjs78-78.4.0/build/pymake/tests/pathdir/src/pathtest.cpp
Examining data/mozjs78-78.4.0/build/unix/elfhack/dummy.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/elf.cpp
Examining data/mozjs78-78.4.0/build/unix/elfhack/elfhack.cpp
Examining data/mozjs78-78.4.0/build/unix/elfhack/elfxx.h
Examining data/mozjs78-78.4.0/build/unix/elfhack/inject.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/test-array.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/test-ctors.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/test.c
Examining data/mozjs78-78.4.0/build/unix/stdc++compat/stdc++compat.cpp
Examining data/mozjs78-78.4.0/build/win32/crashinjectdll/crashinjectdll.cpp
Examining data/mozjs78-78.4.0/build/win32/crashinject.cpp
Examining data/mozjs78-78.4.0/config/external/nspr/_pl_bld.h
Examining data/mozjs78-78.4.0/config/external/nspr/_pr_bld.h
Examining data/mozjs78-78.4.0/config/external/nspr/prcpucfg.h
Examining data/mozjs78-78.4.0/config/external/rlbox/rlbox_config.h
Examining data/mozjs78-78.4.0/config/external/rlbox/rlbox_thread_locals.cpp
Examining data/mozjs78-78.4.0/config/external/rlbox_lucet_sandbox/rlbox_lucet_thread_locals.cpp
Examining data/mozjs78-78.4.0/config/gcc-stl-wrapper.template.h
Examining data/mozjs78-78.4.0/config/gcc_hidden.h
Examining data/mozjs78-78.4.0/config/msvc-stl-wrapper.template.h
Examining data/mozjs78-78.4.0/config/nsinstall.c
Examining data/mozjs78-78.4.0/config/pathsub.c
Examining data/mozjs78-78.4.0/config/pathsub.h
Examining data/mozjs78-78.4.0/config/windows-h-constant.decls.h
Examining data/mozjs78-78.4.0/config/windows-h-unicode.decls.h
Examining data/mozjs78-78.4.0/config/windows-h-wrapper.template.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/appendable.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/brkiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/bytestream.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/bytestrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/bytestriebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/caniter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/casemap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/char16ptr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/chariter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/dbbi.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/docmain.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/dtintrv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/edits.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/enumset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/errorcode.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/filteredbrk.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/icudataver.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/icuplug.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/idna.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/localebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/localematcher.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/localpointer.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/locdspnm.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/locid.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/messagepattern.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/normalizer2.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/normlzr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/parseerr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/parsepos.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/platform.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ptypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/putil.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/rbbi.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/rep.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/resbund.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/schriter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/simpleformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/std_string.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/strenum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringoptions.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringpiece.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringtriebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/symtable.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ubidi.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ubiditransform.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ubrk.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucasemap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucat.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uchar.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucharstrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucharstriebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uchriter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uclean.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnv_cb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnv_err.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnvsel.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uconfig.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucpmap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucptrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucurr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/udata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/udisplaycontext.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uenum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uidna.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uldnames.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uloc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/umachine.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/umisc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/umutablecptrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unifilt.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unifunct.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unimatch.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uniset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unistr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unorm.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unorm2.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uobject.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/urename.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/urep.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ures.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uscript.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/usetiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ushape.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/usprep.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ustring.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ustringtrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utext.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf16.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf32.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf8.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf_old.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utrace.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uvernum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uversion.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/appendable.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bmpset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bmpset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/brkeng.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/brkeng.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytesinkutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytesinkutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestream.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestriebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestrieiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/caniter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/capi_helper.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/characterproperties.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/chariter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/charstr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/charstr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cmemory.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cmemory.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cpputils.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstring.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cwchar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cwchar.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictbe.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictbe.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictionarydata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictionarydata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/dtintrv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/edits.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/errorcode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/filteredbrk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/filterednormalizer2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/hash.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/icudataver.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/icuplugimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/loadednormalizer2impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localematcher.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localeprioritylist.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localeprioritylist.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/localsvc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locavailable.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locbased.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locbased.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdispnames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdistance.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdistance.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdspnm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locid.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/loclikelysubtags.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/loclikelysubtags.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locmap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locmap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locresdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/lsr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/lsr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/messageimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/messagepattern.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/msvcres.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/mutex.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/norm2_nfc_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/norm2allmodes.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/normalizer2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/normalizer2impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/normalizer2impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/normlzr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/parsepos.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/patternprops.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/patternprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/pluralmap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/pluralmap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/propname.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/propname.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/propname_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/propsvec.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/propsvec.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/punycode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/punycode.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/putilimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbi.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbi_cache.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbi_cache.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbidata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbidata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbinode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbinode.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbirb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbirb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbirpt.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbiscan.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbiscan.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbisetb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbisetb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbistbl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbitblb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbitblb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/resbund.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/resbund_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/resource.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/resource.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/restrace.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/restrace.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ruleiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ruleiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/schriter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/serv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/serv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/servlk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servlkf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servloc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/servls.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servnotf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servnotf.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/servrbf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servslkf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/sharedobject.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/sharedobject.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/simpleformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/sprpimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/static_unicode_sets.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/static_unicode_sets.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/stringpiece.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uarrsort.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uarrsort.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uassert.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi_props.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi_props_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidiimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidiln.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubiditransform.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidiwrt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubrk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubrkimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucase.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucase.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucase_props_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucasemap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucasemap_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucasemap_titlecase_brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uchar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uchar_props_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucharstrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucharstriebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucharstrieiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uchriter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln_cmn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln_cmn.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucmndata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucmndata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_cb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_cnv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_ct.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_err.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_ext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_ext.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_io.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_io.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_lmb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_set.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u16.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u32.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u7.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u8.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvbocu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvdisp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvhz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvisci.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvlat1.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvmbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvmbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvscsu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvsel.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucol_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucol_swp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucol_swp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucptrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucptrie_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucurrimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/udata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/udatamem.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/udatamem.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/udataswp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/udataswp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uelement.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uenum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uenumimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uhash.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uhash.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uhash_us.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uidna.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uinit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uinvchar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uinvchar.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulayout_props.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulist.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulist.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uloc_keytype.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulocimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/umapfile.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umapfile.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/umath.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umutablecptrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umutex.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umutex.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifiedcache.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifiedcache.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifilt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifunct.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uniset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uniset_closure.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uniset_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unisetspan.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unisetspan.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_case.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_case_locale.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_titlecase_brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistrappender.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unorm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unormcmp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unormimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uobject.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uposixdefs.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uprops.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ures_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ureslocs.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/usc_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/usc_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uscript.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uscript_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uset_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uset_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/usetiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ushape.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/usprep.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustack.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_cnv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_titlecase_brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_wcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrcase.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrcase_locale.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrenum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrenum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrtrns.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utf_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/util.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/util.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/util_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrace.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utracimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2_builder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie_swap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uts46.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utypeinfo.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvector.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvector.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr32.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr32.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr64.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr64.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/wintz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/wintz.h
Examining data/mozjs78-78.4.0/intl/icu/source/extra/scrptrun/scrptrun.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/extra/scrptrun/scrptrun.h
Examining data/mozjs78-78.4.0/intl/icu/source/extra/scrptrun/srtest.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/extra/uconv/unicode/uwmsg.h
Examining data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/alphaindex.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/basictz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/calendar.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/choicfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/coleitr.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/coll.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/compactdecimalformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/curramt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/currpinf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/currunit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/datefmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dcfmtsym.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/decimfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtfmtsym.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtitvfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtitvinf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtptngen.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/fieldpos.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/fmtable.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/format.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/formattedvalue.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/fpositer.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/gender.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/gregocal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/listformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/measfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/measunit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/measure.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/msgfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/nounit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numberformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numberrangeformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numsys.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/plurfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/plurrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/rbnf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/rbtz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/regex.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/region.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/reldatefmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/scientificnumberformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/search.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/selfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/simpletz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/smpdtfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/sortkey.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/stsearch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tblcoll.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/timezone.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tmunit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tmutamt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tmutfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/translit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tzfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tznames.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tzrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tztrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucol.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucoleitr.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucsdet.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/udat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/udateintervalformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/udatpg.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ufieldpositer.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uformattable.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uformattedvalue.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ugender.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ulistformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ulocdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/umsg.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unirepl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unum.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unumberformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unumsys.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/upluralrules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uregex.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uregion.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ureldatefmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/usearch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uspoof.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/utmscale.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/utrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/vtzone.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/alphaindex.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/anytrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/anytrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/astro.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/basictz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/bocsu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/bocsu.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/brktrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/brktrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/buddhcal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/buddhcal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/casetrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/casetrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cecal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cecal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/chnsecal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/chnsecal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/choicfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coleitr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coll.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collation.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collation.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationbuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationbuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationcompare.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationcompare.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatabuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatabuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatareader.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatareader.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatawriter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatawriter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatin.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatin.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatinbuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatinbuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfcd.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfcd.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationkeys.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationkeys.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationroot.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationroot.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationrootelements.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationrootelements.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationruleparser.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationruleparser.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsets.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsets.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsettings.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsettings.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationtailoring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationtailoring.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationweights.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationweights.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collunsafe.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/compactdecimalformat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coptccal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coptccal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cpdtrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cpdtrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csdetect.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csdetect.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csmatch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csmatch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csr2022.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csr2022.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrecog.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrecog.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrmbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrmbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrsbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrsbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrucode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrucode.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrutf8.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrutf8.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/curramt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currpinf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currunit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dangical.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dangical.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/datefmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dayperiodrules.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dayperiodrules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dcfmtsym.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decContext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decContext.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decimfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum-dtoa.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum-dtoa.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-cached-powers.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-cached-powers.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-diy-fp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-fast-dtoa.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-fast-dtoa.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-ieee.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-string-to-double.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-string-to-double.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-strtod.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-strtod.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-utils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dt_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtfmtsym.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtitv_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/erarules.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/erarules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/esctrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/esctrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ethpccal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ethpccal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fmtable.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fmtable_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fmtableimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/format.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formatted_string_builder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formatted_string_builder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedval_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedval_iterimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedval_sbimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedvalue.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fphdlimp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fphdlimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fpositer.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/funcrepl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/funcrepl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gender.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gregocal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gregoimp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gregoimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/hebrwcal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/hebrwcal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/indiancal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/indiancal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/inputext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/inputext.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/islamcal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/islamcal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/japancal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/japancal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/listformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measunit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measunit_extra.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measunit_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measure.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/msgfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/msgfmt_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/name2uni.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/name2uni.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrlist.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfsubs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfsubs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nortrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nortrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nounit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nultrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nultrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_affixutils.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_affixutils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_asformat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_asformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_capi.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_compact.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_compact.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_currencysymbols.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_currencysymbols.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimalquantity.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimalquantity.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimfmtprops.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimfmtprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decnum.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_fluent.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_formatimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_formatimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_grouping.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_integerwidth.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_longnames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_longnames.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_mapper.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_mapper.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_microprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_modifiers.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_modifiers.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_multiplier.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_multiplier.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_notation.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_output.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_padding.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternmodifier.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternmodifier.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternstring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternstring.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_rounding.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_roundingutils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_scientific.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_scientific.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_skeletons.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_skeletons.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_types.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_utils.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_utils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_utypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_affixes.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_affixes.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_compositions.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_compositions.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_currency.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_currency.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_decimal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_decimal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_parsednumber.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_scientific.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_scientific.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_symbols.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_symbols.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_types.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_utils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_validators.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_validators.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numrange_fluent.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numrange_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numrange_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numsys.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numsys_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/olsontz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/olsontz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/persncal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/persncal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/plurfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quant.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quant.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quantityformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quantityformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbnf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_data.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_pars.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_pars.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_rule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_rule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_set.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_set.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbtz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexcmp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexcmp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexcst.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regeximp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regeximp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexst.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexst.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regextxt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regextxt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/region.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/region_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/reldatefmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/reldtfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/reldtfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rematch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/remtrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/remtrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/repattrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rulebasedcollator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/scientificnumberformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/scriptset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/scriptset.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/search.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/selfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/selfmtimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedbreakiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedbreakiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedcalendar.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/shareddateformatsymbols.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharednumberformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedpluralrules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/simpletz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/smpdtfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/smpdtfst.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/smpdtfst.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sortkey.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/standardplural.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/standardplural.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/string_segment.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/string_segment.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strmatch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strmatch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strrepl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strrepl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/stsearch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/taiwncal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/taiwncal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/titletrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/titletrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tmunit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tmutamt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tmutfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tolowtrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tolowtrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/toupptrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/toupptrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/translit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/transreg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/transreg.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tridpars.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tridpars.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzgnames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzgnames.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tznames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tztrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucln_in.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucln_in.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_res.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_sit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucoleitr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucsdet.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/udat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/udateintervalformat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/udatpg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ufieldpositer.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uitercollationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uitercollationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ulistformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ulocdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/umsg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/umsg_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unesctrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unesctrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uni2name.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uni2name.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unumsys.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/upluralrules.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uregex.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uregexc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uregion.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_build.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_conf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_conf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/usrchimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf16collationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf16collationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf8collationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf8collationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utmscale.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/vtzone.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/wintzimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/wintzimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ztrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ztrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/unicode/ustdio.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/unicode/ustream.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/locbund.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/locbund.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/sprintf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/sscanf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ucln_io.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ucln_io.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufile.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufile.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufmt_cmn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufmt_cmn.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/uprintf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/uprintf.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/uprntf_p.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/uscanf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/uscanf.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/uscanf_p.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ustream.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/stubdata/stubdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/ctest.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/datamap.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/testdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/testlog.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/testtype.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/tstdtmod.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/uperf.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/utimer.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/datamap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/testdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ucln_ct.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/cptbl.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/expect-simple.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/tblgen.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/test-nochange.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/test-simple.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genbrk/genbrk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genccode/genccode.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencfu/gencfu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencmn/gencmn.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencnval/gencnval.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencolusb/extract_unsafe_backwards.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencolusb/verify_uset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/extradata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/extradata.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/gennorm2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/norms.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/norms.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/filterrb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/filterrb.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/genrb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/genrb.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/prscmnts.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/prscmnts.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rbutil.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rbutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/read.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/read.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/reslist.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/reslist.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rle.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rle.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/ustr.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/ustr.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/gensprep.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/gensprep.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/store.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gentest/genres32.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gentest/gentest.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gentest/gentest.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icuinfo/icuinfo.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icuinfo/testplug.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icupkg/icupkg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/gencnvex.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/genmbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/genmbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/ucnvstat.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp
Parsing failed to find end of parameter list; semicolon terminated it in (cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
                pkgDataFlags[GENLIB],
                targetDir,
                libFileNames[LIB_FILE_MINGW],
                pkgDataFlags[LDICUDTFLAGS],
    
Parsing failed to find end of parameter list; semicolon terminated it in (cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
                pkgDataFlags[GENLIB],
                targetDir,
                libFileNames[LIB_FILE_VERSION_TMP],
                pkgDataFlags[LDICUDTFLAGS]
Parsing failed to find end of parameter list; semicolon terminated it in (cmd, "%s %s%s;%s %s -o %s%s %s %s%s %s %s",
                RM_CMD,
                targetDir,
                libFileNames[LIB_FILE_VERSION_TMP],
                pkgDataFlags[GENLIB],
              
Examining data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/collationinfo.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/collationinfo.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/dbgutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/dbgutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/denseranges.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/denseranges.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filetools.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filetools.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/flagparser.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/flagparser.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_icu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_icu.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ppucd.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ppucd.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/swapimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/swapimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/toolutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/toolutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucln_tu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucm.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucmstate.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uoptions.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uoptions.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/xmlparser.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/xmlparser.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/ialloc.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/icuzdump.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/private.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/scheck.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c
Examining data/mozjs78-78.4.0/js/public/experimental/CodeCoverage.h
Examining data/mozjs78-78.4.0/js/public/experimental/SourceHook.h
Examining data/mozjs78-78.4.0/js/public/AllocPolicy.h
Examining data/mozjs78-78.4.0/js/public/AllocationRecording.h
Examining data/mozjs78-78.4.0/js/public/Array.h
Examining data/mozjs78-78.4.0/js/public/ArrayBuffer.h
Examining data/mozjs78-78.4.0/js/public/ArrayBufferMaybeShared.h
Examining data/mozjs78-78.4.0/js/public/BigInt.h
Examining data/mozjs78-78.4.0/js/public/BinASTFormat.h
Examining data/mozjs78-78.4.0/js/public/BuildId.h
Examining data/mozjs78-78.4.0/js/public/CallArgs.h
Examining data/mozjs78-78.4.0/js/public/CallNonGenericMethod.h
Examining data/mozjs78-78.4.0/js/public/CharacterEncoding.h
Examining data/mozjs78-78.4.0/js/public/Class.h
Examining data/mozjs78-78.4.0/js/public/ComparisonOperators.h
Examining data/mozjs78-78.4.0/js/public/CompilationAndEvaluation.h
Examining data/mozjs78-78.4.0/js/public/CompileOptions.h
Examining data/mozjs78-78.4.0/js/public/ContextOptions.h
Examining data/mozjs78-78.4.0/js/public/Conversions.h
Examining data/mozjs78-78.4.0/js/public/Date.h
Examining data/mozjs78-78.4.0/js/public/Debug.h
Examining data/mozjs78-78.4.0/js/public/Equality.h
Examining data/mozjs78-78.4.0/js/public/ErrorReport.h
Examining data/mozjs78-78.4.0/js/public/Exception.h
Examining data/mozjs78-78.4.0/js/public/ForOfIterator.h
Examining data/mozjs78-78.4.0/js/public/GCAPI.h
Examining data/mozjs78-78.4.0/js/public/GCAnnotations.h
Examining data/mozjs78-78.4.0/js/public/GCHashTable.h
Examining data/mozjs78-78.4.0/js/public/GCPolicyAPI.h
Examining data/mozjs78-78.4.0/js/public/GCTypeMacros.h
Examining data/mozjs78-78.4.0/js/public/GCVariant.h
Examining data/mozjs78-78.4.0/js/public/GCVector.h
Examining data/mozjs78-78.4.0/js/public/HashTable.h
Examining data/mozjs78-78.4.0/js/public/HeapAPI.h
Examining data/mozjs78-78.4.0/js/public/Id.h
Examining data/mozjs78-78.4.0/js/public/Initialization.h
Examining data/mozjs78-78.4.0/js/public/JSON.h
Examining data/mozjs78-78.4.0/js/public/LocaleSensitive.h
Examining data/mozjs78-78.4.0/js/public/MemoryFunctions.h
Examining data/mozjs78-78.4.0/js/public/MemoryMetrics.h
Examining data/mozjs78-78.4.0/js/public/Modules.h
Examining data/mozjs78-78.4.0/js/public/OffThreadScriptCompilation.h
Examining data/mozjs78-78.4.0/js/public/Principals.h
Examining data/mozjs78-78.4.0/js/public/Printf.h
Examining data/mozjs78-78.4.0/js/public/ProfilingCategory.h
Examining data/mozjs78-78.4.0/js/public/ProfilingFrameIterator.h
Examining data/mozjs78-78.4.0/js/public/ProfilingStack.h
Examining data/mozjs78-78.4.0/js/public/Promise.h
Examining data/mozjs78-78.4.0/js/public/PropertyDescriptor.h
Examining data/mozjs78-78.4.0/js/public/PropertySpec.h
Examining data/mozjs78-78.4.0/js/public/ProtoKey.h
Examining data/mozjs78-78.4.0/js/public/Proxy.h
Examining data/mozjs78-78.4.0/js/public/Realm.h
Examining data/mozjs78-78.4.0/js/public/RealmOptions.h
Examining data/mozjs78-78.4.0/js/public/RefCounted.h
Examining data/mozjs78-78.4.0/js/public/RegExp.h
Examining data/mozjs78-78.4.0/js/public/RegExpFlags.h
Examining data/mozjs78-78.4.0/js/public/RequiredDefines.h
Examining data/mozjs78-78.4.0/js/public/Result.h
Examining data/mozjs78-78.4.0/js/public/RootingAPI.h
Examining data/mozjs78-78.4.0/js/public/SavedFrameAPI.h
Examining data/mozjs78-78.4.0/js/public/SharedArrayBuffer.h
Examining data/mozjs78-78.4.0/js/public/SliceBudget.h
Examining data/mozjs78-78.4.0/js/public/SourceText.h
Examining data/mozjs78-78.4.0/js/public/StableStringChars.h
Examining data/mozjs78-78.4.0/js/public/Stream.h
Examining data/mozjs78-78.4.0/js/public/StructuredClone.h
Examining data/mozjs78-78.4.0/js/public/SweepingAPI.h
Examining data/mozjs78-78.4.0/js/public/Symbol.h
Examining data/mozjs78-78.4.0/js/public/TraceKind.h
Examining data/mozjs78-78.4.0/js/public/TraceLoggerAPI.h
Examining data/mozjs78-78.4.0/js/public/TracingAPI.h
Examining data/mozjs78-78.4.0/js/public/Transcoding.h
Examining data/mozjs78-78.4.0/js/public/TypeDecls.h
Examining data/mozjs78-78.4.0/js/public/UbiNode.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeBreadthFirst.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeCensus.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeDominatorTree.h
Examining data/mozjs78-78.4.0/js/public/UbiNodePostOrder.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeShortestPaths.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeUtils.h
Examining data/mozjs78-78.4.0/js/public/UniquePtr.h
Examining data/mozjs78-78.4.0/js/public/Utility.h
Examining data/mozjs78-78.4.0/js/public/Value.h
Examining data/mozjs78-78.4.0/js/public/ValueArray.h
Examining data/mozjs78-78.4.0/js/public/Vector.h
Examining data/mozjs78-78.4.0/js/public/Warnings.h
Examining data/mozjs78-78.4.0/js/public/WeakMapPtr.h
Examining data/mozjs78-78.4.0/js/public/Wrapper.h
Examining data/mozjs78-78.4.0/js/rust/etc/wrapper.hpp
Examining data/mozjs78-78.4.0/js/rust/src/jsglue.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Collator.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Collator.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/CommonFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/CommonFunctions.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DateTimeFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DateTimeFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DisplayNames.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DisplayNames.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/IntlObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/IntlObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/ListFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/ListFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Locale.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/MeasureUnitGenerated.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/PluralRules.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/PluralRules.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/RelativeTimeFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/RelativeTimeFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/ScopedICUObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/TimeZoneDataGenerated.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ClassSpecMacro.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/HandlerFunction-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/MiscellaneousOperations-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/MiscellaneousOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/MiscellaneousOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PipeToState.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PipeToState.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PullIntoDescriptor.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PullIntoDescriptor.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueWithSizes-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueWithSizes.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueWithSizes.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueingStrategies.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueingStrategies.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamBYOBReader.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamController.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultController.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultControllerOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultControllerOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultReader.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamInternals.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamInternals.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamReader-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamReader.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamReader.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/StreamAPI.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/StreamController-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/StreamController.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/TeeState.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/TeeState.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStream-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStream.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStream.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultController.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultController.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultControllerOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultControllerOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultWriter-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultWriter.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultWriter.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamWriterOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamWriterOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/Array-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/Array.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Array.h
Examining data/mozjs78-78.4.0/js/src/builtin/AtomicsObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/AtomicsObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/BigInt.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/BigInt.h
Examining data/mozjs78-78.4.0/js/src/builtin/Boolean-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/Boolean.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Boolean.h
Examining data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/DataViewObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/Eval.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Eval.h
Examining data/mozjs78-78.4.0/js/src/builtin/FinalizationRegistryObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/FinalizationRegistryObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/JSON.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/JSON.h
Examining data/mozjs78-78.4.0/js/src/builtin/MapObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/MapObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/ModuleObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/ModuleObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/Object.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Object.h
Examining data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Profilers.h
Examining data/mozjs78-78.4.0/js/src/builtin/Promise-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/Promise.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Promise.h
Examining data/mozjs78-78.4.0/js/src/builtin/Reflect.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Reflect.h
Examining data/mozjs78-78.4.0/js/src/builtin/ReflectParse.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/RegExp.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/RegExp.h
Examining data/mozjs78-78.4.0/js/src/builtin/SelfHostingDefines.h
Examining data/mozjs78-78.4.0/js/src/builtin/Stream.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Stream.h
Examining data/mozjs78-78.4.0/js/src/builtin/String.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/String.h
Examining data/mozjs78-78.4.0/js/src/builtin/Symbol.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Symbol.h
Examining data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.h
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObject-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObjectConstants.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakMapObject-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakMapObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/WeakMapObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakRefObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/WeakRefObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakSetObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/WeakSetObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/include/ffi_common.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/alpha/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/alpha/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arc/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arc/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/avr32/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/avr32/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/bfin/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/bfin/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/frv/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/frv/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ia64_flags.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m88k/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m88k/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/moxie/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/moxie/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/nios2/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/nios2/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/asm.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_linux64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_powerpc.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_sysv.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/s390/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/s390/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh64/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh64/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/tile/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/tile/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/vax/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/vax/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/xtensa/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/xtensa/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/debug.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/java_raw_api.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/prep_cif.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/raw_api.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/types.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn0.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn5.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn6.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_loc_fn0.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_simple.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_12byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_16byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_18byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_19byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_1_1byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_20byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_20byte1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_24byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_2byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_3_1byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_3byte1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_3byte2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_4_1byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_4byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_5_1_byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_5byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_64byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_6_1_byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_6byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_7_1_byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_7byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_8byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_9byte1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_9byte2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_float.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_longdouble.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_longdouble_split.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_longdouble_split2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_pointer.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_sint16.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_sint32.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_sint64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_uint16.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_uint32.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_uint64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_dbls_struct.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_float.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_many_mixed_args.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_many_mixed_float_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_schar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_sshort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_sshortchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_ushort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_ushortchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_pointer.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_pointer_stack.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_schar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_sint.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_sshort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_struct_va1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uchar_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uint.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uint_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ulong_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ulonglong.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ushort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ushort_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/err_bad_abi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/err_bad_typedef.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/ffitest.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/huge_struct.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many_mixed.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/negint.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct10.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct11.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct5.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct6.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct7.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct8.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct9.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/problem1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/promotion.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/pyobjc-tc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_dbl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_dbl1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_dbl2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ldl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ll.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ll1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_sc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_sl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_uc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ul.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_large.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_large2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_medium.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_medium2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct5.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct6.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct7.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct8.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct9.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/testclosure.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/uninitialized.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/unwindtest.cc
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/unwindtest_ffi_call.cc
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_struct1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_struct2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_struct3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp
Examining data/mozjs78-78.4.0/js/src/ctypes/CTypes.h
Examining data/mozjs78-78.4.0/js/src/ctypes/Library.cpp
Examining data/mozjs78-78.4.0/js/src/ctypes/Library.h
Examining data/mozjs78-78.4.0/js/src/ctypes/typedefs.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebugAPI-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebugAPI.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebugScript.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/DebugScript.h
Examining data/mozjs78-78.4.0/js/src/debugger/Debugger-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Debugger.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Debugger.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebuggerMemory.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/DebuggerMemory.h
Examining data/mozjs78-78.4.0/js/src/debugger/Environment-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Environment.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Environment.h
Examining data/mozjs78-78.4.0/js/src/debugger/Frame-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Frame.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Frame.h
Examining data/mozjs78-78.4.0/js/src/debugger/NoExecute.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/NoExecute.h
Examining data/mozjs78-78.4.0/js/src/debugger/Object-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Object.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Object.h
Examining data/mozjs78-78.4.0/js/src/debugger/Script-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Script.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Script.h
Examining data/mozjs78-78.4.0/js/src/debugger/Source.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Source.h
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/exceptions/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/hazards/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/sixgill-tree/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/suppression/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/virtual/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/vprof/testVprofMT.c
Examining data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.h
Examining data/mozjs78-78.4.0/js/src/devtools/Instruments.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/Instruments.h
Examining data/mozjs78-78.4.0/js/src/ds/BitArray.h
Examining data/mozjs78-78.4.0/js/src/ds/Bitmap.cpp
Examining data/mozjs78-78.4.0/js/src/ds/Bitmap.h
Examining data/mozjs78-78.4.0/js/src/ds/Fifo.h
Examining data/mozjs78-78.4.0/js/src/ds/FixedLengthVector.h
Examining data/mozjs78-78.4.0/js/src/ds/IdValuePair.h
Examining data/mozjs78-78.4.0/js/src/ds/InlineTable.h
Examining data/mozjs78-78.4.0/js/src/ds/LifoAlloc.cpp
Examining data/mozjs78-78.4.0/js/src/ds/LifoAlloc.h
Examining data/mozjs78-78.4.0/js/src/ds/MemoryProtectionExceptionHandler.cpp
Examining data/mozjs78-78.4.0/js/src/ds/MemoryProtectionExceptionHandler.h
Examining data/mozjs78-78.4.0/js/src/ds/Nestable.h
Examining data/mozjs78-78.4.0/js/src/ds/OrderedHashTable.h
Examining data/mozjs78-78.4.0/js/src/ds/PageProtectingVector.h
Examining data/mozjs78-78.4.0/js/src/ds/PriorityQueue.h
Examining data/mozjs78-78.4.0/js/src/ds/Sort.h
Examining data/mozjs78-78.4.0/js/src/ds/SplayTree.h
Examining data/mozjs78-78.4.0/js/src/ds/TraceableFifo.h
Examining data/mozjs78-78.4.0/js/src/editline/editline.c
Examining data/mozjs78-78.4.0/js/src/editline/editline.h
Examining data/mozjs78-78.4.0/js/src/editline/sysunix.c
Examining data/mozjs78-78.4.0/js/src/editline/unix.h
Examining data/mozjs78-78.4.0/js/src/frontend/AbstractScopePtr.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/AbstractScopePtr.h
Examining data/mozjs78-78.4.0/js/src/frontend/BCEParserHandle.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinAST-macros.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTEnum.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParser.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParser.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserBase.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserBase.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserPerTokenizer.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserPerTokenizer.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTRuntimeSupport.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTRuntimeSupport.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTToken.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTToken.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderBase.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderBase.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderContext.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderMultipart.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderMultipart.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeCompilation.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeCompiler.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeControlStructures.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeControlStructures.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeOffset.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeSection.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeSection.h
Examining data/mozjs78-78.4.0/js/src/frontend/CForEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/CForEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/CallOrNewEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/CallOrNewEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/CompilationInfo.h
Examining data/mozjs78-78.4.0/js/src/frontend/DefaultEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/DefaultEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/DestructuringFlavor.h
Examining data/mozjs78-78.4.0/js/src/frontend/DoWhileEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/DoWhileEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/EitherParser.h
Examining data/mozjs78-78.4.0/js/src/frontend/ElemOpEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ElemOpEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/EmitterScope.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/EmitterScope.h
Examining data/mozjs78-78.4.0/js/src/frontend/ErrorReporter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ExpressionStatementEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ExpressionStatementEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/FoldConstants.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/FoldConstants.h
Examining data/mozjs78-78.4.0/js/src/frontend/ForInEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ForInEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfLoopControl.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfLoopControl.h
Examining data/mozjs78-78.4.0/js/src/frontend/Frontend2.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/Frontend2.h
Examining data/mozjs78-78.4.0/js/src/frontend/FullParseHandler.h
Examining data/mozjs78-78.4.0/js/src/frontend/FunctionEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/FunctionEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/FunctionSyntaxKind.h
Examining data/mozjs78-78.4.0/js/src/frontend/IfEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/IfEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/JumpList.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/JumpList.h
Examining data/mozjs78-78.4.0/js/src/frontend/LabelEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/LabelEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/LexicalScopeEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/LexicalScopeEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ModuleSharedContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameAnalysisTypes.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameCollections.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/NameFunctions.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameOpEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/NameOpEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ObjLiteral.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ObjLiteral.h
Examining data/mozjs78-78.4.0/js/src/frontend/ObjectEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ObjectEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/OptionalEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/OptionalEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseContext-inl.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseContext.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ParseContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNode.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNodeVerify.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNodeVerify.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNodeVisitor.h
Examining data/mozjs78-78.4.0/js/src/frontend/Parser.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/Parser.h
Examining data/mozjs78-78.4.0/js/src/frontend/PropOpEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/PropOpEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ReservedWords.h
Examining data/mozjs78-78.4.0/js/src/frontend/SharedContext-inl.h
Examining data/mozjs78-78.4.0/js/src/frontend/SharedContext.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/SharedContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/SourceNotes.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/SourceNotes.h
Examining data/mozjs78-78.4.0/js/src/frontend/Stencil.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/Stencil.h
Examining data/mozjs78-78.4.0/js/src/frontend/SwitchEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/SwitchEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/SyntaxParseHandler.h
Examining data/mozjs78-78.4.0/js/src/frontend/TDZCheckCache.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/TDZCheckCache.h
Examining data/mozjs78-78.4.0/js/src/frontend/Token.h
Examining data/mozjs78-78.4.0/js/src/frontend/TokenKind.h
Examining data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/TokenStream.h
Examining data/mozjs78-78.4.0/js/src/frontend/TryEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/TryEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/TypedIndex.h
Examining data/mozjs78-78.4.0/js/src/frontend/UsedNameTracker.h
Examining data/mozjs78-78.4.0/js/src/frontend/ValueUsage.h
Examining data/mozjs78-78.4.0/js/src/frontend/WhileEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/WhileEmitter.h
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testBinASTReader.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testExample.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testRegExp.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testStructuredCloneReader.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testWasm.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/tests.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/tests.h
Examining data/mozjs78-78.4.0/js/src/gc/AllocKind.h
Examining data/mozjs78-78.4.0/js/src/gc/Allocator.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Allocator.h
Examining data/mozjs78-78.4.0/js/src/gc/ArenaList-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/ArenaList.h
Examining data/mozjs78-78.4.0/js/src/gc/AtomMarking-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/AtomMarking.cpp
Examining data/mozjs78-78.4.0/js/src/gc/AtomMarking.h
Examining data/mozjs78-78.4.0/js/src/gc/Barrier.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Barrier.h
Examining data/mozjs78-78.4.0/js/src/gc/Cell.h
Examining data/mozjs78-78.4.0/js/src/gc/ClearEdgesTracer.h
Examining data/mozjs78-78.4.0/js/src/gc/DeletePolicy.h
Examining data/mozjs78-78.4.0/js/src/gc/FinalizationRegistry.cpp
Examining data/mozjs78-78.4.0/js/src/gc/FindSCCs.h
Examining data/mozjs78-78.4.0/js/src/gc/FreeOp-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/FreeOp.h
Examining data/mozjs78-78.4.0/js/src/gc/GC-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/GC.cpp
Examining data/mozjs78-78.4.0/js/src/gc/GC.h
Examining data/mozjs78-78.4.0/js/src/gc/GCEnum.h
Examining data/mozjs78-78.4.0/js/src/gc/GCInternals.h
Examining data/mozjs78-78.4.0/js/src/gc/GCLock.h
Examining data/mozjs78-78.4.0/js/src/gc/GCMarker.h
Examining data/mozjs78-78.4.0/js/src/gc/GCParallelTask.cpp
Examining data/mozjs78-78.4.0/js/src/gc/GCParallelTask.h
Examining data/mozjs78-78.4.0/js/src/gc/GCProbes.h
Examining data/mozjs78-78.4.0/js/src/gc/GCRuntime.h
Examining data/mozjs78-78.4.0/js/src/gc/HashUtil.h
Examining data/mozjs78-78.4.0/js/src/gc/Heap-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Heap.h
Examining data/mozjs78-78.4.0/js/src/gc/Marking-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Marking.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Marking.h
Examining data/mozjs78-78.4.0/js/src/gc/MaybeRooted.h
Examining data/mozjs78-78.4.0/js/src/gc/Memory.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Memory.h
Examining data/mozjs78-78.4.0/js/src/gc/Nursery-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Nursery.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Nursery.h
Examining data/mozjs78-78.4.0/js/src/gc/NurseryAwareHashMap.h
Examining data/mozjs78-78.4.0/js/src/gc/ObjectKind-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/ParallelWork.h
Examining data/mozjs78-78.4.0/js/src/gc/Policy.h
Examining data/mozjs78-78.4.0/js/src/gc/PrivateIterators-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/PublicIterators.cpp
Examining data/mozjs78-78.4.0/js/src/gc/PublicIterators.h
Examining data/mozjs78-78.4.0/js/src/gc/RelocationOverlay.h
Examining data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Rooting.h
Examining data/mozjs78-78.4.0/js/src/gc/Scheduling.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Scheduling.h
Examining data/mozjs78-78.4.0/js/src/gc/Statistics.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Statistics.h
Examining data/mozjs78-78.4.0/js/src/gc/StoreBuffer-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/StoreBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/gc/StoreBuffer.h
Examining data/mozjs78-78.4.0/js/src/gc/Tracer.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Tracer.h
Examining data/mozjs78-78.4.0/js/src/gc/Verifier.cpp
Examining data/mozjs78-78.4.0/js/src/gc/WeakMap-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/WeakMap.cpp
Examining data/mozjs78-78.4.0/js/src/gc/WeakMap.h
Examining data/mozjs78-78.4.0/js/src/gc/WeakMapPtr.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Zone-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Zone.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Zone.h
Examining data/mozjs78-78.4.0/js/src/gc/ZoneAllocator.h
Examining data/mozjs78-78.4.0/js/src/gdb/tests/enum-printers.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-ExecutableAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-GCCellPtr.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-Interpreter.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-JSObject.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-JSString.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-JSSymbol.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-Root.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-asmjs.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsbytecode.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsid.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsop.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsval.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-prettyprinters.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-unwind.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/typedef-printers.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/gdb-tests.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/gdb-tests.h
Examining data/mozjs78-78.4.0/js/src/irregexp/NativeRegExpMacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/NativeRegExpMacroAssembler.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpAST.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpAST.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpBytecode.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpCharacters-inl.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpCharacters.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpCharacters.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpEngine.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpEngine.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpInterpreter.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpMacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpMacroAssembler.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpParser.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpParser.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpStack.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpStack.h
Examining data/mozjs78-78.4.0/js/src/NamespaceImports.h
Examining data/mozjs78-78.4.0/js/src/dtoa.c
Examining data/mozjs78-78.4.0/js/src/jsapi.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi.h
Examining data/mozjs78-78.4.0/js/src/jsdate.cpp
Examining data/mozjs78-78.4.0/js/src/jsdate.h
Examining data/mozjs78-78.4.0/js/src/jsexn.cpp
Examining data/mozjs78-78.4.0/js/src/jsexn.h
Examining data/mozjs78-78.4.0/js/src/jsfriendapi.cpp
Examining data/mozjs78-78.4.0/js/src/jsfriendapi.h
Examining data/mozjs78-78.4.0/js/src/jslibmath.h
Examining data/mozjs78-78.4.0/js/src/jsmath.cpp
Examining data/mozjs78-78.4.0/js/src/jsmath.h
Examining data/mozjs78-78.4.0/js/src/jsnum.cpp
Examining data/mozjs78-78.4.0/js/src/jsnum.h
Examining data/mozjs78-78.4.0/js/src/jspubtd.h
Examining data/mozjs78-78.4.0/js/src/jstypes.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Constants-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Constants-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Disasm-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Disasm-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/llvm-compiler-rt/assembly.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Bailouts-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/MoveEmitter-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/MoveEmitter-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/SharedICHelpers-arm-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/SharedICHelpers-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/SharedICRegisters-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Trampoline-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Assembler-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Assembler-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/CompilerIntrinsics-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Constants-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-Features-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-Features-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Decoder-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Decoder-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Globals-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Logic-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MacroAssembler-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MacroAssembler-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozAssembler-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozCachingDecoder.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozCpu-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozInstructions-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Platform-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-Constants-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Architecture-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Architecture-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Bailouts-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/CodeGenerator-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/CodeGenerator-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/LIR-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Lowering-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Lowering-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MoveEmitter-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MoveEmitter-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/SharedICHelpers-arm64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/SharedICHelpers-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/SharedICRegisters-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Trampoline-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Architecture-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Architecture-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/AtomicOperations-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Bailouts-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/BaselineIC-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/LIR-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MoveEmitter-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MoveEmitter-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/SharedICHelpers-mips-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/SharedICHelpers-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Architecture-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Architecture-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Assembler-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Assembler-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Bailouts-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Bailouts-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/LIR-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Lowering-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Lowering-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MoveEmitter-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MoveEmitter-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/SharedICRegisters-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Trampoline-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Architecture-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Architecture-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Assembler-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Assembler-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Bailouts-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Bailouts-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/LIR-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Lowering-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Lowering-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MoveEmitter-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MoveEmitter-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/SharedICRegisters-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Trampoline-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/none/Architecture-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/CodeGenerator-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/LIR-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/Lowering-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/MacroAssembler-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/MoveEmitter-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/SharedICHelpers-none-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/none/SharedICHelpers-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/SharedICRegisters-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/Trampoline-none.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/Architecture-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky-msvc.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-shared-jit.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-shared-jit.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/CodeGenerator-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/CodeGenerator-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/CodeGenerator-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/IonAssemblerBuffer.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/IonAssemblerBufferWithConstantPools.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/LIR-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Lowering-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Lowering-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/Lowering-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky-gcc.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Assembler-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/Assembler-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Bailouts-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/BaseAssembler-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/LIR-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/SharedICHelpers-x64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/SharedICHelpers-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/SharedICRegisters-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Trampoline-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Architecture-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Architecture-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Assembler-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Assembler-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/AssemblerBuffer-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/AssemblerBuffer-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/BaseAssembler-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Constants-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Encoding-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/LIR-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Lowering-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Lowering-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared-SIMD.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MoveEmitter-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MoveEmitter-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Patching-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Assembler-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/Assembler-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Bailouts-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/BaseAssembler-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/SharedICHelpers-x86-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/SharedICHelpers-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/SharedICRegisters-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Trampoline-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AliasAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AliasAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/AlignmentMaskAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AlignmentMaskAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/AtomicOp.h
Examining data/mozjs78-78.4.0/js/src/jit/BacktrackingAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BacktrackingAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/Bailouts.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Bailouts.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCacheIRCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCacheIRCompiler.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCodeGen.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCodeGen.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineDebugModeOSR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineDebugModeOSR.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrame-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrame.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrame.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrameInfo-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrameInfo.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrameInfo.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineIC.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineIC.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineICList.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineInspector.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineInspector.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineJIT.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineJIT.h
Examining data/mozjs78-78.4.0/js/src/jit/BitSet.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BitSet.h
Examining data/mozjs78-78.4.0/js/src/jit/BytecodeAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BytecodeAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/CacheIR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CacheIR.h
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRCompiler.h
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/CodeGenerator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CodeGenerator.h
Examining data/mozjs78-78.4.0/js/src/jit/CompactBuffer.h
Examining data/mozjs78-78.4.0/js/src/jit/CompileInfo-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/CompileInfo.h
Examining data/mozjs78-78.4.0/js/src/jit/CompileWrappers.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CompileWrappers.h
Examining data/mozjs78-78.4.0/js/src/jit/Disassemble.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Disassemble.h
Examining data/mozjs78-78.4.0/js/src/jit/EdgeCaseAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/EdgeCaseAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/EffectiveAddressAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/EffectiveAddressAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/ExecutableAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/ExecutableAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/FixedList.h
Examining data/mozjs78-78.4.0/js/src/jit/FlushICache.h
Examining data/mozjs78-78.4.0/js/src/jit/FoldLinearArithConstants.cpp
Examining data/mozjs78-78.4.0/js/src/jit/FoldLinearArithConstants.h
Examining data/mozjs78-78.4.0/js/src/jit/ICState.h
Examining data/mozjs78-78.4.0/js/src/jit/ICStubSpace.h
Examining data/mozjs78-78.4.0/js/src/jit/InlinableNatives.h
Examining data/mozjs78-78.4.0/js/src/jit/InlineList.h
Examining data/mozjs78-78.4.0/js/src/jit/InstructionReordering.cpp
Examining data/mozjs78-78.4.0/js/src/jit/InstructionReordering.h
Examining data/mozjs78-78.4.0/js/src/jit/Ion.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Ion.h
Examining data/mozjs78-78.4.0/js/src/jit/IonAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/IonBuilder.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonBuilder.h
Examining data/mozjs78-78.4.0/js/src/jit/IonCacheIRCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonCacheIRCompiler.h
Examining data/mozjs78-78.4.0/js/src/jit/IonCompileTask.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonCompileTask.h
Examining data/mozjs78-78.4.0/js/src/jit/IonIC.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonIC.h
Examining data/mozjs78-78.4.0/js/src/jit/IonInstrumentation.h
Examining data/mozjs78-78.4.0/js/src/jit/IonOptimizationLevels.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonOptimizationLevels.h
Examining data/mozjs78-78.4.0/js/src/jit/IonScript.h
Examining data/mozjs78-78.4.0/js/src/jit/IonTypes.h
Examining data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.h
Examining data/mozjs78-78.4.0/js/src/jit/JSONSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JSONSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/Jit.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Jit.h
Examining data/mozjs78-78.4.0/js/src/jit/JitAllocPolicy.h
Examining data/mozjs78-78.4.0/js/src/jit/JitCode.h
Examining data/mozjs78-78.4.0/js/src/jit/JitCommon.h
Examining data/mozjs78-78.4.0/js/src/jit/JitContext.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitContext.h
Examining data/mozjs78-78.4.0/js/src/jit/JitFrames-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/JitFrames.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitFrames.h
Examining data/mozjs78-78.4.0/js/src/jit/JitOptions.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitOptions.h
Examining data/mozjs78-78.4.0/js/src/jit/JitRealm.h
Examining data/mozjs78-78.4.0/js/src/jit/JitScript-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/JitScript.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitScript.h
Examining data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/JitcodeMap.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitcodeMap.h
Examining data/mozjs78-78.4.0/js/src/jit/LICM.cpp
Examining data/mozjs78-78.4.0/js/src/jit/LICM.h
Examining data/mozjs78-78.4.0/js/src/jit/LIR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/LIR.h
Examining data/mozjs78-78.4.0/js/src/jit/Label.h
Examining data/mozjs78-78.4.0/js/src/jit/Linker.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Linker.h
Examining data/mozjs78-78.4.0/js/src/jit/Lowering.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Lowering.h
Examining data/mozjs78-78.4.0/js/src/jit/MCallOptimize.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MIR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MIR.h
Examining data/mozjs78-78.4.0/js/src/jit/MIRBuilderShared.h
Examining data/mozjs78-78.4.0/js/src/jit/MIRGenerator.h
Examining data/mozjs78-78.4.0/js/src/jit/MIRGraph.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MIRGraph.h
Examining data/mozjs78-78.4.0/js/src/jit/MacroAssembler-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/MacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h
Examining data/mozjs78-78.4.0/js/src/jit/MoveEmitter.h
Examining data/mozjs78-78.4.0/js/src/jit/MoveResolver.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MoveResolver.h
Examining data/mozjs78-78.4.0/js/src/jit/PcScriptCache.h
Examining data/mozjs78-78.4.0/js/src/jit/PerfSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/PerfSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/ProcessExecutableMemory.h
Examining data/mozjs78-78.4.0/js/src/jit/RangeAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/RangeAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/Recover.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Recover.h
Examining data/mozjs78-78.4.0/js/src/jit/RegisterAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/RegisterAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/RegisterSets.h
Examining data/mozjs78-78.4.0/js/src/jit/Registers.h
Examining data/mozjs78-78.4.0/js/src/jit/RematerializedFrame-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/RematerializedFrame.cpp
Examining data/mozjs78-78.4.0/js/src/jit/RematerializedFrame.h
Examining data/mozjs78-78.4.0/js/src/jit/Safepoints.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Safepoints.h
Examining data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp
Examining data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.h
Examining data/mozjs78-78.4.0/js/src/jit/SharedICHelpers-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/SharedICHelpers.h
Examining data/mozjs78-78.4.0/js/src/jit/SharedICRegisters.h
Examining data/mozjs78-78.4.0/js/src/jit/Simulator.h
Examining data/mozjs78-78.4.0/js/src/jit/Sink.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Sink.h
Examining data/mozjs78-78.4.0/js/src/jit/Snapshots.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Snapshots.h
Examining data/mozjs78-78.4.0/js/src/jit/StackSlotAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/TIOracle.cpp
Examining data/mozjs78-78.4.0/js/src/jit/TIOracle.h
Examining data/mozjs78-78.4.0/js/src/jit/TemplateObject-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/TemplateObject.h
Examining data/mozjs78-78.4.0/js/src/jit/TypePolicy.cpp
Examining data/mozjs78-78.4.0/js/src/jit/TypePolicy.h
Examining data/mozjs78-78.4.0/js/src/jit/VMFunctionList-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/VMFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/jit/VMFunctions.h
Examining data/mozjs78-78.4.0/js/src/jit/ValueNumbering.cpp
Examining data/mozjs78-78.4.0/js/src/jit/ValueNumbering.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilder.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilder.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilderShared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilderShared.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpCacheIRTranspiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpCacheIRTranspiler.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpOracle.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpOracle.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpSnapshot.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpSnapshot.h
Examining data/mozjs78-78.4.0/js/src/jit/WasmBCE.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WasmBCE.h
Examining data/mozjs78-78.4.0/js/src/jit/ProcessExecutableMemory.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AtomicOperations.h
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/hidePointer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/selfTest.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAddPropertyPropcache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArgumentsObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArrayBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArrayBufferView.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArrayBufferWithUserOwnedContents.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAssemblerBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAtomicOperations.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAtomizeUtf8NonAsciiLatin1CodePoint.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBigInt.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBoundFunction.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBug604087.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCallArgs.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCallNonGenericMethodOnProxy.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testChromeBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCompileNonSyntactic.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCompileUtf8.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDateToLocaleString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDebugger.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDeepFreeze.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDefineGetterSetterNonEnumerable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDefineProperty.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDefinePropertyIgnoredAttributes.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDeflateStringToUTF8Buffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDifferentNewTargetInvokeConstructor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testEmptyWindowIsOmitted.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorCopying.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorInterceptor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorInterceptorGC.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorLineOfContext.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testException.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testExecuteInJSMEnvironment.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testExternalStrings.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFindSCCs.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testForOfIterator.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testForceLexicalInitialization.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testForwardSetProperty.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFreshGlobalEvalRedefinition.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFunctionBinding.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFunctionProperties.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCCellPtr.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCChunkPool.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCFinalizeCallback.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCGrayMarking.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCHeapBarriers.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCHooks.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCMarking.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCOutOfMemory.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCStoreBufferRemoval.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCUniqueId.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCWeakCache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGetPropertyDescriptor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testHashTable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIndexToString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testInformalValueTypeName.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIntString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIntern.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIntlAvailableLocales.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIsInsideNursery.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIteratorObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJSEvaluateScript.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitDCEinGVN.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitFoldsTo.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitGVN.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMinimalFunc.h
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMoveEmitterCycles-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMoveEmitterCycles.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitRValueAlloc.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitRangeAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitRegisterSet.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testLookup.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testMappedArrayBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testMemoryAssociation.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testMutedErrors.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNewObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNewTargetInvokeConstructor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNullRoot.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNumberToString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testOOM.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testObjectEmulatingUndefined.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testParseJSON.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPersistentRooted.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPreserveJitCode.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPrintError.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPrintf.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPrivateGCThingValue.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testProfileStrings.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPromise.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPropCache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testReadableStream.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testRegExp.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testResolveRecursion.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSABAccounting.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSameValue.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSavedStacks.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptInfo.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptSourceCompression.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSetProperty.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSetPropertyIgnoringNamedGetter.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSharedImmutableStringsCache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSlowScript.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSourcePolicy.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSparseBitmap.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testStringBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testStringIsArrayIndex.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testStructuredClone.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSymbol.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingConditionVariable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingExclusiveData.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingMutex.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingThread.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testToSignedOrUnsignedInteger.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testTypedArrays.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testUTF8.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testUbiNode.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testUncaughtSymbol.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testValueABI.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testWasmLEB128.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testWeakMap.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testWindowNonConfigurable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testXDR.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/tests.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/valueABI.c
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/flags.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/unicode.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/vector.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/zone.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/RegExpAPI.cpp
Examining data/mozjs78-78.4.0/js/src/new-regexp/RegExpAPI.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/RegExpTypes.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/gen-regexp-special-case.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/property-sequences.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/property-sequences.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-ast.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-ast.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-generator-inl.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-generator.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-generator.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-peephole.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-peephole.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecodes.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecodes.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler-tonode.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-dotprinter.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-dotprinter.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-error.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-error.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-interpreter.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-interpreter.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler-arch.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler-tracer.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler-tracer.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-native-macro-assembler.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-nodes.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-parser.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-parser.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-stack.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-stack.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/special-case.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/special-case.h
Examining data/mozjs78-78.4.0/js/src/proxy/BaseProxyHandler.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/CrossCompartmentWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/DeadObjectProxy.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/DeadObjectProxy.h
Examining data/mozjs78-78.4.0/js/src/proxy/OpaqueCrossCompartmentWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/Proxy.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/Proxy.h
Examining data/mozjs78-78.4.0/js/src/proxy/ScriptedProxyHandler.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/ScriptedProxyHandler.h
Examining data/mozjs78-78.4.0/js/src/proxy/SecurityWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/Wrapper.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsrtfuzzing/jsrtfuzzing.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsrtfuzzing/jsrtfuzzing.h
Examining data/mozjs78-78.4.0/js/src/shell/ModuleLoader.cpp
Examining data/mozjs78-78.4.0/js/src/shell/ModuleLoader.h
Examining data/mozjs78-78.4.0/js/src/shell/OSObject.cpp
Examining data/mozjs78-78.4.0/js/src/shell/OSObject.h
Examining data/mozjs78-78.4.0/js/src/shell/StringUtils.h
Examining data/mozjs78-78.4.0/js/src/shell/WasmTesting.cpp
Examining data/mozjs78-78.4.0/js/src/shell/WasmTesting.h
Examining data/mozjs78-78.4.0/js/src/shell/js.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsoptparse.h
Examining data/mozjs78-78.4.0/js/src/shell/jsshell.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsshell.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludes.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludes2-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludes2.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludesOrder-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleA1.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleA2.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleA3.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB1-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB2-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB3-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB4-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/jsheadercycleB5inlines.h
Examining data/mozjs78-78.4.0/js/src/threading/posix/CpuCount.cpp
Examining data/mozjs78-78.4.0/js/src/threading/posix/PosixThread.cpp
Examining data/mozjs78-78.4.0/js/src/threading/posix/ThreadPlatformData.h
Examining data/mozjs78-78.4.0/js/src/threading/windows/CpuCount.cpp
Examining data/mozjs78-78.4.0/js/src/threading/windows/ThreadPlatformData.h
Examining data/mozjs78-78.4.0/js/src/threading/windows/WindowsThread.cpp
Examining data/mozjs78-78.4.0/js/src/threading/ConditionVariable.h
Examining data/mozjs78-78.4.0/js/src/threading/CpuCount.h
Examining data/mozjs78-78.4.0/js/src/threading/ExclusiveData.h
Examining data/mozjs78-78.4.0/js/src/threading/LockGuard.h
Examining data/mozjs78-78.4.0/js/src/threading/Mutex.cpp
Examining data/mozjs78-78.4.0/js/src/threading/Mutex.h
Examining data/mozjs78-78.4.0/js/src/threading/ProtectedData.cpp
Examining data/mozjs78-78.4.0/js/src/threading/ProtectedData.h
Examining data/mozjs78-78.4.0/js/src/threading/Thread.cpp
Examining data/mozjs78-78.4.0/js/src/threading/Thread.h
Examining data/mozjs78-78.4.0/js/src/threading/ThreadId.h
Examining data/mozjs78-78.4.0/js/src/util/AllocPolicy.cpp
Examining data/mozjs78-78.4.0/js/src/util/BitArray.h
Examining data/mozjs78-78.4.0/js/src/util/CheckedArithmetic.h
Examining data/mozjs78-78.4.0/js/src/util/CompleteFile.cpp
Examining data/mozjs78-78.4.0/js/src/util/CompleteFile.h
Examining data/mozjs78-78.4.0/js/src/util/DiagnosticAssertions.h
Examining data/mozjs78-78.4.0/js/src/util/DoubleToString.cpp
Examining data/mozjs78-78.4.0/js/src/util/DoubleToString.h
Examining data/mozjs78-78.4.0/js/src/util/Memory.h
Examining data/mozjs78-78.4.0/js/src/util/NativeStack.cpp
Examining data/mozjs78-78.4.0/js/src/util/NativeStack.h
Examining data/mozjs78-78.4.0/js/src/util/Poison.h
Examining data/mozjs78-78.4.0/js/src/util/Printf.cpp
Examining data/mozjs78-78.4.0/js/src/util/StringBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/util/StringBuffer.h
Examining data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/util/StructuredSpewer.h
Examining data/mozjs78-78.4.0/js/src/util/Text.cpp
Examining data/mozjs78-78.4.0/js/src/util/Text.h
Examining data/mozjs78-78.4.0/js/src/util/TrailingArray.h
Examining data/mozjs78-78.4.0/js/src/util/Unicode.cpp
Examining data/mozjs78-78.4.0/js/src/util/Unicode.h
Examining data/mozjs78-78.4.0/js/src/util/UnicodeNonBMP.h
Examining data/mozjs78-78.4.0/js/src/util/Utility.cpp
Examining data/mozjs78-78.4.0/js/src/util/Windows.h
Examining data/mozjs78-78.4.0/js/src/vm/Activation-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Activation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Activation.h
Examining data/mozjs78-78.4.0/js/src/vm/ArgumentsObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ArgumentsObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArgumentsObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObjectMaybeShared.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferViewObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferViewObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayObject.h
Examining data/mozjs78-78.4.0/js/src/vm/AsyncFunction.cpp
Examining data/mozjs78-78.4.0/js/src/vm/AsyncFunction.h
Examining data/mozjs78-78.4.0/js/src/vm/AsyncFunctionResolveKind.h
Examining data/mozjs78-78.4.0/js/src/vm/AsyncIteration.cpp
Examining data/mozjs78-78.4.0/js/src/vm/AsyncIteration.h
Examining data/mozjs78-78.4.0/js/src/vm/AtomsTable.h
Examining data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BigIntType.h
Examining data/mozjs78-78.4.0/js/src/vm/BooleanObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BooleanObject.h
Examining data/mozjs78-78.4.0/js/src/vm/BuildId.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeFormatFlags.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeIterator-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeIterator.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeLocation-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeLocation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeLocation.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeUtil-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.h
Examining data/mozjs78-78.4.0/js/src/vm/Caches-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Caches.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Caches.h
Examining data/mozjs78-78.4.0/js/src/vm/CallNonGenericMethod.cpp
Examining data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp
Examining data/mozjs78-78.4.0/js/src/vm/CheckIsObjectKind.h
Examining data/mozjs78-78.4.0/js/src/vm/CodeCoverage.cpp
Examining data/mozjs78-78.4.0/js/src/vm/CodeCoverage.h
Examining data/mozjs78-78.4.0/js/src/vm/CommonPropertyNames.h
Examining data/mozjs78-78.4.0/js/src/vm/Compartment-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Compartment.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Compartment.h
Examining data/mozjs78-78.4.0/js/src/vm/CompilationAndEvaluation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Compression.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Compression.h
Examining data/mozjs78-78.4.0/js/src/vm/DateObject.h
Examining data/mozjs78-78.4.0/js/src/vm/DateTime.cpp
Examining data/mozjs78-78.4.0/js/src/vm/DateTime.h
Examining data/mozjs78-78.4.0/js/src/vm/EnvironmentObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.h
Examining data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp
Examining data/mozjs78-78.4.0/js/src/vm/EqualityOperations.h
Examining data/mozjs78-78.4.0/js/src/vm/ErrorObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ErrorObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ErrorObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ErrorReporting.h
Examining data/mozjs78-78.4.0/js/src/vm/Exception.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ForOfIterator.cpp
Examining data/mozjs78-78.4.0/js/src/vm/FrameIter-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/FrameIter.cpp
Examining data/mozjs78-78.4.0/js/src/vm/FrameIter.h
Examining data/mozjs78-78.4.0/js/src/vm/FunctionFlags.cpp
Examining data/mozjs78-78.4.0/js/src/vm/FunctionFlags.h
Examining data/mozjs78-78.4.0/js/src/vm/FunctionPrefixKind.h
Examining data/mozjs78-78.4.0/js/src/vm/GeckoProfiler-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.cpp
Examining data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.h
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorAndAsyncKind.h
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorObject.h
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorResumeKind.h
Examining data/mozjs78-78.4.0/js/src/vm/GlobalObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/GlobalObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/GlobalObject.h
Examining data/mozjs78-78.4.0/js/src/vm/HelperThreads.cpp
Examining data/mozjs78-78.4.0/js/src/vm/HelperThreads.h
Examining data/mozjs78-78.4.0/js/src/vm/Id.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Initialization.cpp
Examining data/mozjs78-78.4.0/js/src/vm/InlineCharBuffer-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Instrumentation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Instrumentation.h
Examining data/mozjs78-78.4.0/js/src/vm/Interpreter-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Interpreter.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Interpreter.h
Examining data/mozjs78-78.4.0/js/src/vm/IsGivenTypeObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Iteration.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Iteration.h
Examining data/mozjs78-78.4.0/js/src/vm/JSAtom-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSAtom.h
Examining data/mozjs78-78.4.0/js/src/vm/JSContext-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSContext.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSContext.h
Examining data/mozjs78-78.4.0/js/src/vm/JSFunction-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSFunction.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSFunction.h
Examining data/mozjs78-78.4.0/js/src/vm/JSONParser.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSONParser.h
Examining data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSONPrinter.h
Examining data/mozjs78-78.4.0/js/src/vm/JSObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSObject.h
Examining data/mozjs78-78.4.0/js/src/vm/JSScript-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSScript.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSScript.h
Examining data/mozjs78-78.4.0/js/src/vm/JitActivation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JitActivation.h
Examining data/mozjs78-78.4.0/js/src/vm/List-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/List.cpp
Examining data/mozjs78-78.4.0/js/src/vm/List.h
Examining data/mozjs78-78.4.0/js/src/vm/MallocProvider.h
Examining data/mozjs78-78.4.0/js/src/vm/MatchPairs.h
Examining data/mozjs78-78.4.0/js/src/vm/MemoryMetrics.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ModuleBuilder.h
Examining data/mozjs78-78.4.0/js/src/vm/Modules.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Monitor.h
Examining data/mozjs78-78.4.0/js/src/vm/MutexIDs.h
Examining data/mozjs78-78.4.0/js/src/vm/NativeObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/NativeObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/NativeObject.h
Examining data/mozjs78-78.4.0/js/src/vm/NumberObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/NumberObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectGroup-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectGroup.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ObjectGroup.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectOperations-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectOperations.h
Examining data/mozjs78-78.4.0/js/src/vm/OffThreadPromiseRuntimeState.cpp
Examining data/mozjs78-78.4.0/js/src/vm/OffThreadPromiseRuntimeState.h
Examining data/mozjs78-78.4.0/js/src/vm/OffThreadScriptCompilation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Opcodes.h
Examining data/mozjs78-78.4.0/js/src/vm/PIC.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PIC.h
Examining data/mozjs78-78.4.0/js/src/vm/PlainObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/PlainObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PlainObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Printer.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Printer.h
Examining data/mozjs78-78.4.0/js/src/vm/Probes-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Probes.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Probes.h
Examining data/mozjs78-78.4.0/js/src/vm/ProfilingStack.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PromiseLookup.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PromiseLookup.h
Examining data/mozjs78-78.4.0/js/src/vm/PromiseObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ProxyObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ProxyObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Realm-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Realm.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Realm.h
Examining data/mozjs78-78.4.0/js/src/vm/ReceiverGuard-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ReceiverGuard.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ReceiverGuard.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/RegExpObject.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpShared.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpStatics.cpp
Examining data/mozjs78-78.4.0/js/src/vm/RegExpStatics.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpStaticsObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Runtime.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Runtime.h
Examining data/mozjs78-78.4.0/js/src/vm/SavedFrame.h
Examining data/mozjs78-78.4.0/js/src/vm/SavedStacks-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/SavedStacks.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SavedStacks.h
Examining data/mozjs78-78.4.0/js/src/vm/Scope.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Scope.h
Examining data/mozjs78-78.4.0/js/src/vm/ScopeKind.h
Examining data/mozjs78-78.4.0/js/src/vm/SelfHosting.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SelfHosting.h
Examining data/mozjs78-78.4.0/js/src/vm/Shape-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Shape.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Shape.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedArrayObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SharedArrayObject.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedImmutableStringsCache-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedImmutableStringsCache.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SharedImmutableStringsCache.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedMem.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedStencil.h
Examining data/mozjs78-78.4.0/js/src/vm/SourceHook.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Stack-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Stack.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Stack.h
Examining data/mozjs78-78.4.0/js/src/vm/StencilEnums.h
Examining data/mozjs78-78.4.0/js/src/vm/StringObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/StringObject.h
Examining data/mozjs78-78.4.0/js/src/vm/StringType-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/StringType.cpp
Parsing failed to find end of parameter list; semicolon terminated it in (0b1111'0000 | (astral >> 18));
          buffer[1] = char(0b1000'0000 | ((astral >> 12) & 0b11'1111));
          buffer[2] = char(0b1000'0000 | ((astral >> 6) & 0b11'1111));
          buffer[3] = cha
Examining data/mozjs78-78.4.0/js/src/vm/StringType.h
Examining data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SymbolType.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SymbolType.h
Examining data/mozjs78-78.4.0/js/src/vm/TaggedProto.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TaggedProto.h
Examining data/mozjs78-78.4.0/js/src/vm/ThrowMsgKind.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ThrowMsgKind.h
Examining data/mozjs78-78.4.0/js/src/vm/Time.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Time.h
Examining data/mozjs78-78.4.0/js/src/vm/ToSource.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ToSource.h
Examining data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TraceLogging.h
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.h
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingTypes.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingTypes.h
Examining data/mozjs78-78.4.0/js/src/vm/TypeInference-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TypeInference.h
Examining data/mozjs78-78.4.0/js/src/vm/TypeSet.h
Examining data/mozjs78-78.4.0/js/src/vm/TypedArrayObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/TypedArrayObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TypedArrayObject.h
Examining data/mozjs78-78.4.0/js/src/vm/UbiNode.cpp
Examining data/mozjs78-78.4.0/js/src/vm/UbiNodeCensus.cpp
Examining data/mozjs78-78.4.0/js/src/vm/UbiNodeShortestPaths.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Value.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Warnings.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Warnings.h
Examining data/mozjs78-78.4.0/js/src/vm/WrapperObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Xdr.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Xdr.h
Examining data/mozjs78-78.4.0/js/src/vtune/legacy/ittnotify.h
Examining data/mozjs78-78.4.0/js/src/vtune/VTuneWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/vtune/VTuneWrapper.h
Examining data/mozjs78-78.4.0/js/src/vtune/disable_warnings.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_config.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_types.h
Examining data/mozjs78-78.4.0/js/src/vtune/jitprofiling.c
Examining data/mozjs78-78.4.0/js/src/vtune/jitprofiling.h
Examining data/mozjs78-78.4.0/js/src/wasm/cranelift/baldrapi.h
Examining data/mozjs78-78.4.0/js/src/wasm/cranelift/clifapi.h
Examining data/mozjs78-78.4.0/js/src/wasm/AsmJS.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/AsmJS.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBuiltins.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBuiltins.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCode.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmConstants.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCraneliftCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCraneliftCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmDebug.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmDebug.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmFrameIter.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmFrameIter.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGC.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGC.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmInstance.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmJS.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmModule.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmOpIter.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmOpIter.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmProcess.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmProcess.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmRealm.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmRealm.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmSignalHandlers.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmStubs.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmStubs.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTable.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTable.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTypes.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTypes.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmUtility.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmValidate.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmSignalHandlers.cpp
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/API/Memory.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/API/Memory.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Allocator.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Allocator.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/ArgParse.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/ArgParse.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Bitset.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Bitset.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Comparison.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Format.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Format.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/List.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/List.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Object.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Status.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/String.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Types.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Vector.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Vector.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Zycore.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Zycore.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/ZycoreString.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumISAExt.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumISASet.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumInstructionCategory.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumMnemonic.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumRegister.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/DecoderData.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/FormatterATT.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/FormatterBase.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/FormatterIntel.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/SharedData.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/String.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Decoder.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Decoder.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/DecoderData.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/DecoderTypes.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Formatter.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Formatter.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterATT.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterBase.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterBuffer.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterBuffer.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterIntel.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/MetaInfo.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/MetaInfo.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Mnemonic.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Mnemonic.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Register.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Register.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/SharedData.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/SharedTypes.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/ShortString.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Status.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Utils.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Utils.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Zydis.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Zydis.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/ZydisString.c
Examining data/mozjs78-78.4.0/js/src/zydis/ZycoreExportConfig.h
Examining data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp
Examining data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.h
Examining data/mozjs78-78.4.0/js/src/zydis/ZydisExportConfig.h
Examining data/mozjs78-78.4.0/memory/build/Mutex.h
Examining data/mozjs78-78.4.0/memory/build/Utils.h
Examining data/mozjs78-78.4.0/memory/build/fallback.cpp
Examining data/mozjs78-78.4.0/memory/build/malloc_decls.h
Examining data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp
Examining data/mozjs78-78.4.0/memory/build/mozjemalloc.h
Examining data/mozjs78-78.4.0/memory/build/mozjemalloc_types.h
Examining data/mozjs78-78.4.0/memory/build/mozmemory.h
Examining data/mozjs78-78.4.0/memory/build/mozmemory_wrap.cpp
Examining data/mozjs78-78.4.0/memory/build/mozmemory_wrap.h
Examining data/mozjs78-78.4.0/memory/build/rb.h
Examining data/mozjs78-78.4.0/memory/build/replace_malloc.h
Examining data/mozjs78-78.4.0/memory/build/replace_malloc_bridge.h
Examining data/mozjs78-78.4.0/memory/build/zone.c
Examining data/mozjs78-78.4.0/memory/mozalloc/cxxalloc.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/cxxalloc.h
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc.h
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_abort.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_abort.h
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_oom.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_oom.h
Examining data/mozjs78-78.4.0/memory/mozalloc/msvc_raise_wrappers.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/throw_gcc.h
Examining data/mozjs78-78.4.0/memory/mozalloc/winheap.cpp
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum-dtoa.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum-dtoa.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/cached-powers.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/cached-powers.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/diy-fp.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-conversion.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fast-dtoa.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fast-dtoa.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fixed-dtoa.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fixed-dtoa.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/ieee.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/string-to-double.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/string-to-double.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/strtod.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/strtod.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/utils.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4.c
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4frame.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4frame_static.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4hc.c
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4hc.h
Examining data/mozjs78-78.4.0/mfbt/lz4/xxh3.h
Examining data/mozjs78-78.4.0/mfbt/lz4/xxhash.c
Examining data/mozjs78-78.4.0/mfbt/lz4/xxhash.h
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestAlgorithm.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestBuffer.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestInitializedOnce.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestLinkedList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestMozDbg.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestResultExtensions.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestSpan.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestAlgorithm.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestArray.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestArrayUtils.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestAtomics.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestBinarySearch.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestBloomFilter.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestBufferList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCasting.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCeilingFloor.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCheckedInt.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCompactPair.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCountPopulation.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCountZeroes.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestDefineEnum.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestDoublyLinkedList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEndian.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEnumSet.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEnumTypeTraits.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEnumeratedArray.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFastBernoulliTrial.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFloatingPoint.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFunctionRef.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFunctionTypeTraits.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestHashTable.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestIntegerRange.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestJSONWriter.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestLinkedList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMacroArgs.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMacroForEach.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMathAlgorithms.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMaybe.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestNonDereferenceable.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestNotNull.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRandomNum.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRange.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRefPtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestResult.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRollingMean.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSHA1.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSPSCQueue.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSaturate.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestScopeExit.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSegmentedVector.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSmallPointerArray.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSplayTree.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTemplateLib.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTextUtils.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestThreadSafeWeakPtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTuple.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTypeTraits.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTypedEnum.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestUniquePtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestUtf8.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestVariant.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestVector.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestWeakPtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestWrappingOperations.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestXorShift128PlusRNG.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestPoisonArea.cpp
Examining data/mozjs78-78.4.0/mfbt/Algorithm.h
Examining data/mozjs78-78.4.0/mfbt/Alignment.h
Examining data/mozjs78-78.4.0/mfbt/AllocPolicy.h
Examining data/mozjs78-78.4.0/mfbt/AlreadyAddRefed.h
Examining data/mozjs78-78.4.0/mfbt/Array.h
Examining data/mozjs78-78.4.0/mfbt/ArrayUtils.h
Examining data/mozjs78-78.4.0/mfbt/Assertions.cpp
Examining data/mozjs78-78.4.0/mfbt/Assertions.h
Examining data/mozjs78-78.4.0/mfbt/Atomics.h
Examining data/mozjs78-78.4.0/mfbt/Attributes.h
Examining data/mozjs78-78.4.0/mfbt/BinarySearch.h
Examining data/mozjs78-78.4.0/mfbt/BloomFilter.h
Examining data/mozjs78-78.4.0/mfbt/Buffer.h
Examining data/mozjs78-78.4.0/mfbt/BufferList.h
Examining data/mozjs78-78.4.0/mfbt/Casting.h
Examining data/mozjs78-78.4.0/mfbt/ChaosMode.cpp
Examining data/mozjs78-78.4.0/mfbt/ChaosMode.h
Examining data/mozjs78-78.4.0/mfbt/Char16.h
Examining data/mozjs78-78.4.0/mfbt/CheckedInt.h
Examining data/mozjs78-78.4.0/mfbt/CompactPair.h
Examining data/mozjs78-78.4.0/mfbt/Compiler.h
Examining data/mozjs78-78.4.0/mfbt/Compression.cpp
Examining data/mozjs78-78.4.0/mfbt/Compression.h
Examining data/mozjs78-78.4.0/mfbt/DbgMacro.h
Examining data/mozjs78-78.4.0/mfbt/DebugOnly.h
Examining data/mozjs78-78.4.0/mfbt/DefineEnum.h
Examining data/mozjs78-78.4.0/mfbt/DoublyLinkedList.h
Examining data/mozjs78-78.4.0/mfbt/EndianUtils.h
Examining data/mozjs78-78.4.0/mfbt/EnumSet.h
Examining data/mozjs78-78.4.0/mfbt/EnumTypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/EnumeratedArray.h
Examining data/mozjs78-78.4.0/mfbt/EnumeratedRange.h
Examining data/mozjs78-78.4.0/mfbt/FStream.h
Examining data/mozjs78-78.4.0/mfbt/FastBernoulliTrial.h
Examining data/mozjs78-78.4.0/mfbt/FloatingPoint.cpp
Examining data/mozjs78-78.4.0/mfbt/FloatingPoint.h
Examining data/mozjs78-78.4.0/mfbt/FunctionRef.h
Examining data/mozjs78-78.4.0/mfbt/FunctionTypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/GuardObjects.h
Examining data/mozjs78-78.4.0/mfbt/HashFunctions.cpp
Examining data/mozjs78-78.4.0/mfbt/HashFunctions.h
Examining data/mozjs78-78.4.0/mfbt/HashTable.h
Examining data/mozjs78-78.4.0/mfbt/HelperMacros.h
Examining data/mozjs78-78.4.0/mfbt/InitializedOnce.h
Examining data/mozjs78-78.4.0/mfbt/IntegerPrintfMacros.h
Examining data/mozjs78-78.4.0/mfbt/IntegerRange.h
Examining data/mozjs78-78.4.0/mfbt/IntegerTypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/JSONWriter.cpp
Examining data/mozjs78-78.4.0/mfbt/JSONWriter.h
Examining data/mozjs78-78.4.0/mfbt/JsRust.h
Examining data/mozjs78-78.4.0/mfbt/Latin1.h
Examining data/mozjs78-78.4.0/mfbt/Likely.h
Examining data/mozjs78-78.4.0/mfbt/LinkedList.h
Examining data/mozjs78-78.4.0/mfbt/LinuxSignal.h
Examining data/mozjs78-78.4.0/mfbt/MacroArgs.h
Examining data/mozjs78-78.4.0/mfbt/MacroForEach.h
Examining data/mozjs78-78.4.0/mfbt/MathAlgorithms.h
Examining data/mozjs78-78.4.0/mfbt/Maybe.h
Examining data/mozjs78-78.4.0/mfbt/MaybeOneOf.h
Examining data/mozjs78-78.4.0/mfbt/MemoryChecking.h
Examining data/mozjs78-78.4.0/mfbt/MemoryReporting.h
Examining data/mozjs78-78.4.0/mfbt/NonDereferenceable.h
Examining data/mozjs78-78.4.0/mfbt/NotNull.h
Examining data/mozjs78-78.4.0/mfbt/Opaque.h
Examining data/mozjs78-78.4.0/mfbt/OperatorNewExtensions.h
Examining data/mozjs78-78.4.0/mfbt/Path.h
Examining data/mozjs78-78.4.0/mfbt/PodOperations.h
Examining data/mozjs78-78.4.0/mfbt/Poison.cpp
Examining data/mozjs78-78.4.0/mfbt/Poison.h
Examining data/mozjs78-78.4.0/mfbt/RandomNum.cpp
Examining data/mozjs78-78.4.0/mfbt/RandomNum.h
Examining data/mozjs78-78.4.0/mfbt/Range.h
Examining data/mozjs78-78.4.0/mfbt/RangedArray.h
Examining data/mozjs78-78.4.0/mfbt/RangedPtr.h
Examining data/mozjs78-78.4.0/mfbt/ReentrancyGuard.h
Examining data/mozjs78-78.4.0/mfbt/RefCountType.h
Examining data/mozjs78-78.4.0/mfbt/RefCounted.h
Examining data/mozjs78-78.4.0/mfbt/RefPtr.h
Examining data/mozjs78-78.4.0/mfbt/Result.h
Examining data/mozjs78-78.4.0/mfbt/ResultExtensions.h
Examining data/mozjs78-78.4.0/mfbt/ReverseIterator.h
Examining data/mozjs78-78.4.0/mfbt/RollingMean.h
Examining data/mozjs78-78.4.0/mfbt/SHA1.cpp
Examining data/mozjs78-78.4.0/mfbt/SHA1.h
Examining data/mozjs78-78.4.0/mfbt/SPSCQueue.h
Examining data/mozjs78-78.4.0/mfbt/Saturate.h
Examining data/mozjs78-78.4.0/mfbt/ScopeExit.h
Examining data/mozjs78-78.4.0/mfbt/Scoped.h
Examining data/mozjs78-78.4.0/mfbt/SegmentedVector.h
Examining data/mozjs78-78.4.0/mfbt/SharedLibrary.h
Examining data/mozjs78-78.4.0/mfbt/SmallPointerArray.h
Examining data/mozjs78-78.4.0/mfbt/Span.h
Examining data/mozjs78-78.4.0/mfbt/SplayTree.h
Examining data/mozjs78-78.4.0/mfbt/Sprintf.h
Examining data/mozjs78-78.4.0/mfbt/StaticAnalysisFunctions.h
Examining data/mozjs78-78.4.0/mfbt/TaggedAnonymousMemory.cpp
Examining data/mozjs78-78.4.0/mfbt/TaggedAnonymousMemory.h
Examining data/mozjs78-78.4.0/mfbt/Tainting.h
Examining data/mozjs78-78.4.0/mfbt/TemplateLib.h
Examining data/mozjs78-78.4.0/mfbt/TextUtils.h
Examining data/mozjs78-78.4.0/mfbt/ThreadLocal.h
Examining data/mozjs78-78.4.0/mfbt/ThreadSafeWeakPtr.h
Examining data/mozjs78-78.4.0/mfbt/ToString.h
Examining data/mozjs78-78.4.0/mfbt/TsanOptions.h
Examining data/mozjs78-78.4.0/mfbt/Tuple.h
Examining data/mozjs78-78.4.0/mfbt/TypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/TypedEnumBits.h
Examining data/mozjs78-78.4.0/mfbt/Types.h
Examining data/mozjs78-78.4.0/mfbt/UniquePtr.h
Examining data/mozjs78-78.4.0/mfbt/UniquePtrExtensions.cpp
Examining data/mozjs78-78.4.0/mfbt/UniquePtrExtensions.h
Examining data/mozjs78-78.4.0/mfbt/Unused.cpp
Examining data/mozjs78-78.4.0/mfbt/Unused.h
Examining data/mozjs78-78.4.0/mfbt/Utf8.cpp
Examining data/mozjs78-78.4.0/mfbt/Utf8.h
Examining data/mozjs78-78.4.0/mfbt/Variant.h
Examining data/mozjs78-78.4.0/mfbt/Vector.h
Examining data/mozjs78-78.4.0/mfbt/WeakPtr.h
Examining data/mozjs78-78.4.0/mfbt/WindowsVersion.h
Examining data/mozjs78-78.4.0/mfbt/WrappingOperations.h
Examining data/mozjs78-78.4.0/mfbt/XorShift128PlusRNG.h
Examining data/mozjs78-78.4.0/mfbt/fallible.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_acos.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_acosh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_asin.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_atan2.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_atanh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_cosh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_exp.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_hypot.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_log.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_log10.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_log2.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_pow.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_sinh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/fdlibm.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/k_exp.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/k_log.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/math_private.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_asinh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_atan.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_cbrt.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_ceil.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_ceilf.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_copysign.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_expm1.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_fabs.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_floor.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_floorf.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_log1p.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_nearbyint.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_rint.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_rintf.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_scalbn.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_tanh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_trunc.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_truncf.cpp
Examining data/mozjs78-78.4.0/modules/zlib/src/adler32.c
Examining data/mozjs78-78.4.0/modules/zlib/src/compress.c
Examining data/mozjs78-78.4.0/modules/zlib/src/crc32.c
Examining data/mozjs78-78.4.0/modules/zlib/src/crc32.h
Examining data/mozjs78-78.4.0/modules/zlib/src/deflate.c
Examining data/mozjs78-78.4.0/modules/zlib/src/deflate.h
Examining data/mozjs78-78.4.0/modules/zlib/src/gzclose.c
Examining data/mozjs78-78.4.0/modules/zlib/src/gzguts.h
Examining data/mozjs78-78.4.0/modules/zlib/src/gzlib.c
Examining data/mozjs78-78.4.0/modules/zlib/src/gzread.c
Examining data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c
Examining data/mozjs78-78.4.0/modules/zlib/src/infback.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inffast.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inffast.h
Examining data/mozjs78-78.4.0/modules/zlib/src/inffixed.h
Examining data/mozjs78-78.4.0/modules/zlib/src/inflate.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inflate.h
Examining data/mozjs78-78.4.0/modules/zlib/src/inftrees.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inftrees.h
Examining data/mozjs78-78.4.0/modules/zlib/src/mozzconf.h
Examining data/mozjs78-78.4.0/modules/zlib/src/trees.c
Examining data/mozjs78-78.4.0/modules/zlib/src/trees.h
Examining data/mozjs78-78.4.0/modules/zlib/src/uncompr.c
Examining data/mozjs78-78.4.0/modules/zlib/src/zconf.h
Examining data/mozjs78-78.4.0/modules/zlib/src/zlib.h
Examining data/mozjs78-78.4.0/modules/zlib/src/zutil.c
Examining data/mozjs78-78.4.0/modules/zlib/src/zutil.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/vtune/ittnotify.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/EHABIStackWalk.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/EHABIStackWalk.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/PageInformation.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/PageInformation.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/PlatformMacros.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBuffer.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileJSONWriter.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfiledThreadData.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfiledThreadData.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilerBacktrace.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilerBacktrace.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilerMarkerPayload.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilingCategory.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilingStack.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/RegisteredThread.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/RegisteredThread.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ThreadInfo.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/VTuneProfiler.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/VTuneProfiler.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-linux-android.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-macos.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-win32.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-macos.cc
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-win32.cc
Parsing failed to find end of parameter list; semicolon terminated it in (moduleNameStr.cbegin(), moduleNameStr.cend(),
                   detoured_dll.cbegin(), detoured_dll.cend(),
                   [](char aModuleChar, char aDetouredChar) {
                     return 
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/AutoObjectMapper.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/AutoObjectMapper.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulCommon.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulCommonExt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfExt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfInt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfSummariser.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfSummariser.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElfExt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElfInt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMainInt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/platform-linux-lul.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/platform-linux-lul.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfileJSONWriter.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfiler.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerCounts.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerDetail.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerMarkerPayload.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerSharedLibraries.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilingCategory.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilingStack.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BlocksRingBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/PowerOfTwo.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunk.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunkManager.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunkManagerSingle.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunkManagerWithLocalLimit.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferControlledChunkManager.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferIndex.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileChunkedBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/leb128iterator.h
Examining data/mozjs78-78.4.0/mozglue/build/AsanOptions.cpp
Examining data/mozjs78-78.4.0/mozglue/build/BionicGlue.cpp
Examining data/mozjs78-78.4.0/mozglue/build/SSE.cpp
Examining data/mozjs78-78.4.0/mozglue/build/SSE.h
Examining data/mozjs78-78.4.0/mozglue/build/TsanOptions.cpp
Examining data/mozjs78-78.4.0/mozglue/build/UbsanOptions.cpp
Examining data/mozjs78-78.4.0/mozglue/build/arm.cpp
Examining data/mozjs78-78.4.0/mozglue/build/arm.h
Examining data/mozjs78-78.4.0/mozglue/build/dummy.cpp
Examining data/mozjs78-78.4.0/mozglue/build/mips.cpp
Examining data/mozjs78-78.4.0/mozglue/build/mips.h
Examining data/mozjs78-78.4.0/mozglue/build/ppc.cpp
Examining data/mozjs78-78.4.0/mozglue/build/ppc.h
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/Decimal.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/Decimal.h
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/DoubleConversion.h
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/moz-decimal-utils.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/Arm64.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/Arm64.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/MMPolicies.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/PatcherBase.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/PatcherDetour.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/PatcherNopSpace.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/RangeMap.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/TargetFunction.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/Trampoline.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/VMSharingPolicies.h
Examining data/mozjs78-78.4.0/mozglue/misc/AutoProfilerLabel.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/AutoProfilerLabel.h
Examining data/mozjs78-78.4.0/mozglue/misc/ConditionVariable_posix.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/ConditionVariable_windows.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/Debug.h
Examining data/mozjs78-78.4.0/mozglue/misc/DynamicallyLinkedFunctionPtr.h
Examining data/mozjs78-78.4.0/mozglue/misc/ImportDir.h
Examining data/mozjs78-78.4.0/mozglue/misc/MmapFaultHandler.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/MmapFaultHandler.h
Examining data/mozjs78-78.4.0/mozglue/misc/MutexPlatformData_posix.h
Examining data/mozjs78-78.4.0/mozglue/misc/MutexPlatformData_windows.h
Examining data/mozjs78-78.4.0/mozglue/misc/Mutex_posix.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/Mutex_windows.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/NativeNt.h
Examining data/mozjs78-78.4.0/mozglue/misc/PlatformConditionVariable.h
Examining data/mozjs78-78.4.0/mozglue/misc/PlatformMutex.h
Examining data/mozjs78-78.4.0/mozglue/misc/Printf.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/Printf.h
Examining data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/StackWalk.h
Examining data/mozjs78-78.4.0/mozglue/misc/StackWalk_windows.h
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp.h
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_darwin.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_posix.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_windows.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_windows.h
Examining data/mozjs78-78.4.0/mozglue/misc/WinUtils.h
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsMapRemoteView.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsMapRemoteView.h
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsProcessMitigations.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsProcessMitigations.h
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsUnicode.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsUnicode.h
Examining data/mozjs78-78.4.0/mozglue/misc/nsWindowsDllInterceptor.h
Examining data/mozjs78-78.4.0/mozglue/static/rust/wrappers.cpp
Examining data/mozjs78-78.4.0/nsprpub/config/gcc_hidden.h
Examining data/mozjs78-78.4.0/nsprpub/config/libc_r.h
Examining data/mozjs78-78.4.0/nsprpub/config/now.c
Examining data/mozjs78-78.4.0/nsprpub/config/nsinstall.c
Examining data/mozjs78-78.4.0/nsprpub/config/pathsub.h
Examining data/mozjs78-78.4.0/nsprpub/config/prdepend.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plarena.c
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plarena.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plarenas.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plhash.c
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plhash.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plbase64.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plerror.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plgetopt.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plstr.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/base64.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/plerror.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/plgetopt.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/plvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcase.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcat.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strchr.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcmp.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcpy.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strdup.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strlen.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strpbrk.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strstr.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strtok.c
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/plvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.h
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/getopt.c
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/string.c
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_aix.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_bsdi.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_darwin.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_freebsd.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_hpux.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_linux.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_netbsd.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_nspr_pthread.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_nto.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_openbsd.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_os2.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_os2_errors.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_pcos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_pth.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_qnx.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_riscos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_scoos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_solaris.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_unix_errors.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_unixos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_unixware.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_win32_errors.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_win95.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_winnt.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/prosdep.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/pralarm.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/probslet.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/protypes.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/prsem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/pprio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/pprmwait.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/pprthred.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/primpl.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/prpriv.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/gencfg.c
Examining data/mozjs78-78.4.0/nsprpub/pr/include/nspr.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/pratom.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prbit.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prclist.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prcmon.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prcountr.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prcvar.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prdtoa.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prenv.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prerr.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prerror.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prinet.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prinit.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prinrval.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/pripcsem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlink.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlog.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlong.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prmem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prmon.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prmwait.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prnetdb.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prolock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prpdce.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prprf.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prproces.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prrng.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prrwlock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prshm.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prshma.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prsystem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prthread.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtime.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtpool.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtrace.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtypes.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prvrsion.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prwin16.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/fileio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/interval.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/switch.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/thread.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/time.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/tpd.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcascii.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcbase.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcbase.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rccv.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rccv.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcfileio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcfileio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcinrval.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcinrval.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rclock.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rclock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcmon.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetdb.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetdb.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcthread.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcthread.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rctime.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rctime.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prdir.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prfdcach.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/priometh.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/pripv6.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prlayer.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prmapopt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prmmap.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prmwait.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prpolevt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prscanf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prstdio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2_errors.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2cv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2gc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2inrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2poll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2rng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2sem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2sock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2thred.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/aix.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/aixwrap.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/bsdi.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/darwin.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/dgux.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/freebsd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/hpux.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/linux.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/netbsd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/nto.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/openbsd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/pthreads_user.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/qnx.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/riscos.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/scoos.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/solaris.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix_errors.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unixware.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxpoll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxproces.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxrng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxwrap.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntdllmn.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntgc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntinrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntsec.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntthread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32ipcsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32poll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32rng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32shm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95cv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95dllmain.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95sock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95thred.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/win32_errors.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/prosdep.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/memory/prseg.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/memory/prshm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/memory/prshma.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/dtoa.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pralarm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pratom.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/praton.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prdtoa.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prenv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerror.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerrortable.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripcsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prlog2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prlong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prolock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prrng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prsystem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prthinfo.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtime.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtpool.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptmisc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptsynch.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prucpu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prucv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prulock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prustack.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/pruthr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prcmon.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prcthr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prdump.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prmon.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prrwlock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prtpd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/prvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dll/mygetval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dll/mysetval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/abstract.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/accept.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/acceptread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/acceptreademu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/addrstr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/affinity.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/alarm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/append.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/atomic.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/attach.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile3.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bug1test.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cleanup.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/concur.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cvar.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cvar2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dceemu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/depend.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dlltest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dtoa.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/env.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/errcodes.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/errset.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/exit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/fdcach.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/fileio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/foreign.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/forktest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/formattm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/freeif.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/fsync.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/getai.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/getproto.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/i2l.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/initclk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/inrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/instrumt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/intrio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/intrupt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeout.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeoutk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeoutu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ioconthr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ipv6.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/join.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinkk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinku.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinuk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinuu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/layer.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lazyinit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/libfilename.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lltest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lockfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/logfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/logger.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/makedir.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/many_cv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/mbcs.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/monref.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/multiacc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nbconn.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nblayer.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nonblock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ntioto.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ntoh.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/obsints.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_2long.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_excl.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_filnf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_filok.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_noacc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_nofil.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/openfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/parent.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/parsetm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/peek.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/perf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipeself.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/poll_er.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/poll_nm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/poll_to.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pollable.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prfdbl.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prftest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prftest1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prftest2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prfz.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/primblok.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/priotest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prpoll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prpollml.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prselect.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prttools.h
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pushtop.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/randseed.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/reinit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/rmdir.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/rwlockrank.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/rwlocktest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sel_spd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selct_er.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selct_nm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selct_to.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/select2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selintr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sema.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semaerr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semaerr1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semaping.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semapong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sendzlf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/server_test.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_kk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_ku.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_uk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_uu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/short_thread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sigpipe.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sleep.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/socket.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sockopt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sockping.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sockpong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/stack.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/stat.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/stdio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/str2addr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/strod.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/suspend.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/switch.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/system.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/testbit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/threads.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_client.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/time.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/timemac.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/timetest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/tpd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ut_ttools.h
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/vercheck.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/version.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/writev.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/xnotify.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/y2k.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/y2ktmo.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/yield.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/zerolen.c
Examining data/mozjs78-78.4.0/nsprpub/tools/httpget.c
Examining data/mozjs78-78.4.0/nsprpub/tools/tail.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/dom1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/gfx.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/dom1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/dom2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/gfx.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/mozilla2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/pprio.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/ipc/chromium/src/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/ipc/glue/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/trunk/webrtc/build/function.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/trunk/webrtc/build/no_op_function.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/trunk/webrtc/modules/include/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/prog/qux/qux1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/real/foo/foo1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/real/foo/foo2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/shared/baz/baz1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/static/bar/bar_helper/bar_helper1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/static/bar/bar1.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/static/bar/bar2.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/c-library/c-library.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/c-program/c_test_program.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/c-simple-programs/c_simple_program.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-library/c-source.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-library/cxx-library.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-program/cxx_test_program.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-simple-programs/cxx_simple_program.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/bar.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/bar.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/foo.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/test-support-binaries-tracked/test/test-one.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/test-support-binaries-tracked/test/test-two.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test2.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/visual-studio/dir1/bar.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/visual-studio/dir1/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/allow-compiler-warnings/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/asflags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-defines/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags-field-validation/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags-templates/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags-type-validation/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-includes/subdir/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-includes/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/disable-compiler-warnings/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/disable-stl-wrapping/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-generated/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-generated/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-missing-generated/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-missing/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-missing/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/bar.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/baz.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/dom1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/dom2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/dom3.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/gfx.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mem.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mem2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mozilla2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/pprio.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/pprthred.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/files-test-metadata/simple/base.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-compile-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/link-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/local_includes-filename/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/program/test_program1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/program/test_program2.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/resolved-flags-error/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources-just-c/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/test-linkables-cxx-link/one/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/test-linkables-cxx-link/two/foo.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/bar.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/c1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/c2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/quux.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/bar.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/c1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/c2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/quux.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test2.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/visibility-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-compile-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/d.c
Examining data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/datastack.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/datastack.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/filedisp.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/filedisp.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/module.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/stats.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/tracer.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/tracer.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/util.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/common.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/common.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/ifaddrs.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/ifaddrs.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_kernel_structs.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/proc_socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/proc_socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/sys_socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/sys_socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/osx/process_info.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/osx/process_info.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/v10/ifaddrs.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/v10/ifaddrs.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/cpu.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/cpu.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/ntextapi.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_handles.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_handles.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_utils.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_utils.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/security.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/security.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/wmi.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/wmi.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_linux.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c
Examining data/mozjs78-78.4.0/third_party/python/pyrsistent/pvectorcmodule.c
Examining data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c
Examining data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.h
Examining data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c
Examining data/mozjs78-78.4.0/third_party/python/scandir/osdefs.h
Examining data/mozjs78-78.4.0/third_party/python/scandir/winreparse.h
Examining data/mozjs78-78.4.0/third_party/rust/audio_thread_priority/atp_test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/audio_thread_priority/audio_thread_priority.h
Examining data/mozjs78-78.4.0/third_party/rust/authenticator/src/linux/hidwrapper.h
Examining data/mozjs78-78.4.0/third_party/rust/authenticator/src/u2fhid-capi.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/chars.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/fail.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/floats.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/int_signed.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/int_unsigned.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/strings.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/test_llvm_bug_9069.h
Examining data/mozjs78-78.4.0/third_party/rust/chardetng_c/include/chardetng.h
Examining data/mozjs78-78.4.0/third_party/rust/clang-sys/tests/header.h
Examining data/mozjs78-78.4.0/third_party/rust/cose-c/include/cosec.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/cmake/sanitizers-cmake/tests/asan_test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/cmake/sanitizers-cmake/tests/shortest.ext.test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/codegear/gtest_all.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/codegear/gtest_link.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-death-test-internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-filepath.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-linked_ptr.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-param-util-generated.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-param-util.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-string.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-tuple.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-type-util.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-death-test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-message.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-param-test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-printers.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-spi.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-test-part.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-typed-test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest_pred_impl.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest_prod.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/prime_tables.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample1.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample1.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample10_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample1_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample3-inl.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample3_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample4.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample4.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample4_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample5_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample6_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample7_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample8_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample9_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-all.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-death-test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-filepath.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-internal-inl.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-test-part.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-typed-test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest_main.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-death-test_ex_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-death-test_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-filepath_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-linked_ptr_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-listener_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-message_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-options_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-param-test2_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-param-test_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-param-test_test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-port_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-test-part_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-tuple_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-typed-test2_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-typed-test_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-typed-test_test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-unittest-api_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_all_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_break_on_failure_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_catch_exceptions_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_color_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_env_var_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_environment_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_filter_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_help_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_list_tests_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_main_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_no_test_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_output_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_pred_impl_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_prod_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_repeat_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_shuffle_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_sole_header_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_stress_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_throw_on_failure_ex_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_throw_on_failure_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_uninitialized_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_xml_outfile1_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_xml_outfile2_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_xml_output_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/production.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/production.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/include/cubeb/cubeb.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/audiotrack_definitions.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/cubeb-output-latency.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/cubeb_media_library.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/sles_definitions.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/arch.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/fixed_generic.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/resample.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/resample_neon.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/resample_sse.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/speex_config_types.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/speex_resampler.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/stack_alloc.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-jni-instances.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-jni.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-jni.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-sles.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-speex-resampler.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_alsa.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_array_queue.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_assert.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_audiotrack.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_audiounit.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_kai.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_mixer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_mixer.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_opensl.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_osx_run_loop.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_osx_run_loop.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_pulse.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_resampler.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_resampler.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_resampler_internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_ring_array.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_ringbuffer.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sndio.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_strings.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_strings.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils_unix.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils_win.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_wasapi.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/common.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_audio.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_callback_ret.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_deadlock.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_device_changed_callback.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_devices.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_duplex.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_latency.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_loopback.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_overload_callback.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_record.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_resampler.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_ring_array.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_ring_buffer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_sanity.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_tone.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_utils.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/tools/cubeb-test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_statics.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c_mem/include/encoding_rs_mem.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c_mem/include/encoding_rs_mem_cpp.h
Examining data/mozjs78-78.4.0/third_party/rust/freetype/etc/bindings.h
Examining data/mozjs78-78.4.0/third_party/rust/gfx-backend-metal/shaders/macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/contrib/glslopt/Main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/gl.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/KHR/khrplatform.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_posix.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11_compat.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c99_alloca.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c99_compat.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c99_math.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/no_extern_c.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-lex.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp_standalone_scaffolding.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp_standalone_scaffolding.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_array_index.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_expr.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_function.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_type.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_int64.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_types.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_variables.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/generate_ir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_optimizer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_optimizer.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_symbol_table.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_symbol_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/hir_field_selection.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_array_refcount.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_array_refcount.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_basic_block.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_basic_block.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_clone.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_constant_expression.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_equals.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_flattening.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_flattening.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_strings.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function_can_inline.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function_detect_recursion.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function_inlining.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_hierarchical_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_hierarchical_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_hv_accept.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_optimization.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_rvalue_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_rvalue_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_set_program_inouts.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_uniform.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_unused_structs.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_unused_structs.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_validate.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_variable_refcount.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_variable_refcount.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_atomics.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_functions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_interface_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_block_active_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_block_active_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_initializers.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_varyings.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_varyings.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker_util.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker_util.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/list.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/loop_analysis.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/loop_analysis.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/loop_unroll.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_blend_equation_advanced.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_buffer_access.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_buffer_access.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_const_arrays_to_uniforms.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_cs_derived.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_discard.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_discard_flow.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_distance.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_if_to_cond_assign.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_int64.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_jumps.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_mat_op_to_vec.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_named_interface_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_noise.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_offset_array.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_output_reads.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packed_varyings.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packing_builtins.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_shared_reference.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_subroutine.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_tess_level.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_texture_projection.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_ubo_reference.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_variable_index_to_cond_assign.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vec_index_to_cond_assign.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vec_index_to_swizzle.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector_derefs.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector_insert.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vertex_id.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_add_neg_to_sub.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_algebraic.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_array_splitting.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_conditional_discard.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_constant_folding.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_constant_propagation.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_constant_variable.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_copy_propagation_elements.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_builtin_variables.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_builtin_varyings.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_code.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_code_local.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_functions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_flatten_nested_if_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_flip_matrices.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_function_inlining.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_if_simplification.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_minmax.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_rebalance_tree.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_redundant_jumps.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_structure_splitting.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_swizzle.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_tree_grafting.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_vectorize.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/program.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/propagate_invariance.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/s_expression.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/s_expression.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/serialize.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/serialize.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/string_to_uint_map.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/string_to_uint_map.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/test_optpass.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/builtin_type_macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl_types.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl_types.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/shader_enums.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/shader_enums.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/shader_info.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/auxiliary/util/u_half.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/include/pipe/p_compiler.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/include/pipe/p_config.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/include/pipe/p_format.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mapi/glapi/glapi.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/compiler.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/config.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/dd.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/debug_output.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/draw.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/enums.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/errors.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/extensions.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/extensions_table.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/extensions_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/formats.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/glheader.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/hash.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/menums.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/mtypes.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/shaderobj.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/uniforms.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/version.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/math/m_matrix.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/dummy_errors.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/ir_to_mesa.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_instruction.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_parameter.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_statevars.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/program.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/symbol_table.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/symbol_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/vbo/vbo.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/sha1/sha1.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/sha1/sha1.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/bitscan.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/bitset.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/crc32.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/crc32.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/detect_os.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/fast_urem_by_const.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/fnv1a.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/futex.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/half_float.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/half_float.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/hash_table.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/hash_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/list.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1_test.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/rounding.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/set.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/set.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/simple_mtx.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/softfloat.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/softfloat.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/strndup.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/strtod.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/strtod.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_atomic.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_dynarray.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_endian.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_math.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_math.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_string.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/wrapper.hpp
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/AsyncFunctionResolveKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/BytecodeFormatFlags.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/CheckIsObjectKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/FunctionFlags.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/FunctionPrefixKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/GeneratorAndAsyncKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/GeneratorResumeKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/Opcodes.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/SourceNotes.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/StencilEnums.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/Symbol.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/ThrowMsgKind.h
Examining data/mozjs78-78.4.0/third_party/rust/libloading/src/os/unix/global_static.c
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.h
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3ext.h
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/wrapper.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/infback9.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/infback9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inffix9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inflate9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inftree9.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inftree9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/inflate86/inffas86.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream_test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/test.cc
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/masmx64/inffas8664.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/crypt.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/iowin32.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/iowin32.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/unzip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/unzip.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/puff.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/puff.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/pufftest.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/testzlib/testzlib.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/enough.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/fitblk.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzjoin.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zpipe.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/adler32.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/compress.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/crc32.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/crc32.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/deflate.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/deflate.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzclose.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzread.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/infback.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inffast.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inffast.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inffixed.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inflate.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inflate.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inftrees.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inftrees.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/trees.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/trees.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/uncompr.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zconf.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zlib.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/smoke.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/lmdb.h
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_copy.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_dump.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_load.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_stat.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/midl.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/midl.h
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest2.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime-internals/src/context/tests/c_child.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime-internals/src/instance/siginfo_ext.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_types.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_val.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_vmctx.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/tests/guests/null.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/tests/guests/yield_resume.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/tests/c_api.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/hello.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/pseudoquine.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/include/lucet_wasi.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/cant_dotdot.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/clock_getres.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/exitcode.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/follow_symlink.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/getentropy.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/getrusage.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/gettimeofday.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/notdir.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/poll.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/preopen_populates.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file_twice.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/stat.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/stdin.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/symlink_escape.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/symlink_loop.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/write_file.c
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/mozpkix.hpp
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_err.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_error.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_io.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_time.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_ciphers.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_init.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_p11.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_secerr.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_ssl.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_sslerr.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_sslopt.h
Examining data/mozjs78-78.4.0/third_party/rust/nix/src/errno_dragonfly.c
Examining data/mozjs78-78.4.0/third_party/rust/nix/test/test_kmod/hello_mod/hello.c
Examining data/mozjs78-78.4.0/third_party/rust/raw-cpuid/src/cpuid.c
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/c_src/lucet_sandbox_wrapper.c
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/include/lucet_sandbox.h
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/include/rlbox_lucet_sandbox.hpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue.cpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue_embedder_vars.cpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue_main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue_preload.cpp
Examining data/mozjs78-78.4.0/third_party/rust/shift_or_euc_c/include/shift_or_euc.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/barrier.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/external_interface.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/image.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/internal_interface.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/sampler.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/thread_group.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/GLSL.std.450.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cfg.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cfg.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cpp.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cpp.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_c.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_c.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_error_handling.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_parsed_ir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_parsed_ir.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_util.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_util.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_hlsl.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_hlsl.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_msl.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_msl.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_parser.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_parser.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_reflect.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_reflect.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/wrapper.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/wrapper.hpp
Examining data/mozjs78-78.4.0/third_party/rust/walkdir/compare/nftw.c
Examining data/mozjs78-78.4.0/third_party/rust/yaml-rust/tests/specs/handler_spec_test.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerRunner.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerRunner.h
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerTestHarness.h
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.h
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterfaceStream.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterfaceStream.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerBuiltins.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerBuiltinsMsvc.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerCommand.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerCorpus.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerCrossOver.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDataFlowTrace.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDataFlowTrace.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDefs.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDictionary.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDriver.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctions.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctionsDlsym.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctionsWeak.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctionsWindows.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtraCounters.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerFork.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerFork.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOPosix.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOWindows.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerInterface.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerInternal.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerLoop.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMain.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMerge.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMerge.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerOptions.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerRandom.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerSHA1.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerSHA1.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerTracePC.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerTracePC.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtil.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtil.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilDarwin.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilFuchsia.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilLinux.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilPosix.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilWindows.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerValueBitMap.h
Examining data/mozjs78-78.4.0/tools/fuzzing/registry/FuzzerRegistry.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/registry/FuzzerRegistry.h

FINAL RESULTS:

data/mozjs78-78.4.0/config/nsinstall.c:163:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(toname, mode) < 0)
data/mozjs78-78.4.0/config/nsinstall.c:174:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(toname, (mode & (S_IREAD | S_IWRITE))) < 0)
data/mozjs78-78.4.0/config/nsinstall.c:341:31:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      if ((owner || group) && chown(toname, uid, gid) < 0)
data/mozjs78-78.4.0/config/nsinstall.c:377:38:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
          (!S_ISLNK(tosb.st_mode) || readlink(toname, buf, sizeof buf) != len ||
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1113:32:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        int32_t ret = (int32_t)readlink(TZDEFAULT, gTimeZoneBuffer, sizeof(gTimeZoneBuffer)-1);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:656:20:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t slen = readlink(linkName, linkTarget, linkTargetLen);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:748:24:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  ssize_t exeNameLen = readlink("/proc/self/exe", exeName, sizeof(exeName) - 1);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:242:37:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
            if ((owner || group) && chown(toname, uid, gid) < 0) {
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:277:18:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
                 readlink(toname, buf, sizeof buf) != len ||
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:338:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(toname, mode) < 0)
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c:141:19:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t len = readlink(buf, path, sizeof(path) - 1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:33812:42:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  { "readlink",     (sqlite3_syscall_ptr)readlink,        0 },
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:32:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#    define chmod(path,mode)    _chmod(path,mode)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:277:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod(item->fname,item->mode);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:527:11:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    (void)chmod(to, was.st_mode & 07777);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:530:11:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    (void)chown(to, was.st_uid, was.st_gid);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4821:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
			SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4821:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
			SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE);
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.h:17:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  size_t Len = snprintf(nullptr, 0, Format.c_str(), ArgList...);
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.h:19:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(Buf.get(), Len + 1, Format.c_str(), ArgList...);
data/mozjs78-78.4.0/build/macosx/permissions/chown_revert.c:16:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  return execl("/usr/sbin/chown", "/usr/sbin/chown", "-R", "-h", uidstring,
data/mozjs78-78.4.0/build/macosx/permissions/chown_root.c:10:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  return execl("/usr/sbin/chown", "/usr/sbin/chown", "-R", "-h", "root:admin",
data/mozjs78-78.4.0/build/unix/stdc++compat/stdc++compat.cpp:68:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(buf, sizeof(buf), fmt, ap);
data/mozjs78-78.4.0/config/nsinstall.c:195:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(destdir, "%s%s%s", to, _DIRECTORY_SEPARATOR, base);
data/mozjs78-78.4.0/config/nsinstall.c:214:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(direntry, "%s/%s", from, ep->d_name);
data/mozjs78-78.4.0/config/nsinstall.c:215:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(destentry, "%s%s%s", destdir, _DIRECTORY_SEPARATOR, ep->d_name);
data/mozjs78-78.4.0/config/nsinstall.c:330:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(toname, "%s%s%s", todir, _DIRECTORY_SEPARATOR, base);
data/mozjs78-78.4.0/config/nsinstall.c:344:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access(name, R_OK) != 0) {
data/mozjs78-78.4.0/config/nsinstall.c:355:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(linkname, "%s/%s", linkprefix, name);
data/mozjs78-78.4.0/config/nsinstall.c:363:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(linkname + lplen, name);
data/mozjs78-78.4.0/config/pathsub.c:43:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, ap);
data/mozjs78-78.4.0/config/pathsub.c:108:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char* xstrdup(char* s) { return strcpy(xmalloc(strlen(s) + 1), s); }
data/mozjs78-78.4.0/config/pathsub.c:133:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    len = strlen(strcpy(outpath, to));
data/mozjs78-78.4.0/config/pathsub.c:145:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(outpath + len, "%s/", buf);
data/mozjs78-78.4.0/config/pathsub.c:157:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  cp = strcpy(outpath + PATH_MAX - (len + 1), name);
data/mozjs78-78.4.0/config/pathsub.c:166:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cp, name);
data/mozjs78-78.4.0/config/pathsub.c:176:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(outpath, cp);
data/mozjs78-78.4.0/intl/icu/source/common/cstring.h:36:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define uprv_strcpy(dst, src) U_STANDARD_CPP_NAMESPACE  strcpy(dst, src)
data/mozjs78-78.4.0/intl/icu/source/common/cstring.h:39:56:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define uprv_strcat(dst, src) U_STANDARD_CPP_NAMESPACE strcat(dst, src)
data/mozjs78-78.4.0/intl/icu/source/common/cwchar.h:41:24:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
#   define uprv_wcscpy wcscpy
data/mozjs78-78.4.0/intl/icu/source/common/cwchar.h:42:24:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
#   define uprv_wcscat wcscat
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:44:62:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DBG(x) fprintf(stderr, "%s:%d: ",__FILE__,__LINE__); fprintf x
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2073:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(codepage,UCNV_SWAP_LFNL_OPTION_STRING);
data/mozjs78-78.4.0/intl/icu/source/common/rbbirb.h:223:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define RBBIDebugPrintf printf
data/mozjs78-78.4.0/intl/icu/source/common/udata.cpp:1456:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
U_CAPI void U_EXPORT2 udata_setFileAccess(UDataFileAccess access, UErrorCode * /*status*/)
data/mozjs78-78.4.0/intl/icu/source/common/udata.cpp:1459:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gDataFileAccess = access;
data/mozjs78-78.4.0/intl/icu/source/common/unicode/udata.h:414:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
udata_setFileAccess(UDataFileAccess access, UErrorCode *status);
data/mozjs78-78.4.0/intl/icu/source/common/unicode/utext.h:1242:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    UTextAccess *access;
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:42:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return ut->pFuncs->access(ut, index, forward);
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:117:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ut->pFuncs->access(ut, index, TRUE);
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:130:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                ut->pFuncs->access(ut, ut->chunkNativeStart, FALSE);
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:192:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeLimit, TRUE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:222:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, nativePosition, TRUE)) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:225:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        UBool r = ut->pFuncs->access(ut, nativePosition, FALSE);  // reverse iteration flag loads preceding chunk
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:273:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeLimit, TRUE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:287:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeLimit, TRUE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:313:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeStart, FALSE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:327:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeStart, FALSE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:354:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if(!ut->pFuncs->access(ut, index, TRUE)) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:394:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if(!ut->pFuncs->access(ut, index, FALSE)) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:403:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->chunkOffset==0 && !ut->pFuncs->access(ut, index, FALSE)) {
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:40:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/chnsecal.cpp:43:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp:7937:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     else printf(spec, ar[i]);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:106:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "skeleton: %s; pattern: %s\n", result, result_1);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:725:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "in getBestSkeleton: fSkeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:771:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "in getBestSkeleton: fSkeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:565:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "in getBestSkeleton: skeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:631:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "available skeletons: skeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/islamcal.cpp:45:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/olsontz.cpp:45:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/regeximp.h:46:36:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define REGEX_SCAN_DEBUG_PRINTF(a) printf a
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:60:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/ulocdata.cpp:229:16:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        return system;
data/mozjs78-78.4.0/intl/icu/source/i18n/ulocdata.cpp:237:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    return system;
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:354:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pathToFunction, nodeList[i]->name);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:355:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pathToFunction, separatorString);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:357:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathToFunction, nodeList[i]->name); /* including 'root' */
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:389:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(gTestName, pathToFunction);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:413:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(ERROR_LOG[ERRONEOUS_FUNCTION_COUNT++], pathToFunction);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:687:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:707:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(buf, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:729:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:748:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:761:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:778:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:1282:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(XML_PREFIX,rootName);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:44:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buffer, fmt, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:71:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buffer, fmt, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:96:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buffer, fmt, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/genbrk/genbrk.cpp:182:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "genbrk writes dummy %s because of UCONFIG_NO_BREAK_ITERATION and/or UCONFIG_NO_FILE_IO, see uconfig.h", outFileName);
data/mozjs78-78.4.0/intl/icu/source/tools/genccode/genccode.c:174:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf(stdout, message, filename);
data/mozjs78-78.4.0/intl/icu/source/tools/gencfu/gencfu.cpp:196:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "gencfu writes dummy %s because of UCONFIG_NO_REGULAR_EXPRESSIONS and/or UCONFIG_NO_NORMALIZATION and/or UCONFIG_NO_FILE_IO, see uconfig.h", outFileName);
data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp:304:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "gendict writes dummy %s because of UCONFIG_NO_BREAK_ITERATION and/or UCONFIG_NO_FILE_IO, see uconfig.h", outFileName);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:831:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const UVersionInfo %s_formatVersion={", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:833:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const UVersionInfo %s_dataVersion={", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:835:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const int32_t %s_indexes[Normalizer2Impl::IX_COUNT]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:840:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const uint16_t %s_extraData[%%ld]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:842:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const uint8_t %s_smallFCD[%%ld]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.c:31:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, msg, va);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.c:69:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, msg, va);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:473:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(byteBuffer, byteDecl, byteArray[byteIterator]);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:477:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(byteBuffer, byteDecl, (byteArray[byteIterator]-256));
data/mozjs78-78.4.0/intl/icu/source/tools/icupkg/icupkg.cpp:529:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(outFilenameBuffer, inFilename);
data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp:82:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf((FILE *)context, fmt, args);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:537:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "bash -c \"%s\"", command);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:540:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "QSH CMD('%s')", command);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:553:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    int result = system(cmd);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:692:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(checkLibFile, "%s%s", targetDir, libFileNames[LIB_FILE_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:929:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE], "%s", libName);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:931:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:937:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE], "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:948:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_MINGW], "lib%s.dll.a", libName);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:950:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_CYGWIN], "cyg%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:954:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_CYGWIN_VERSION], "cyg%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:963:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:968:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:975:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_OS390BATCH_VERSION], "%s%s.x",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:978:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_OS390BATCH_MAJOR], "%s%s.x",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:983:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:988:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:997:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_MAJOR], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1002:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1007:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_MAJOR], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1014:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1032:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION], "%s.%s", libFileNames[LIB_FILE], pkgDataFlags[A_EXT]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1055:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1071:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name1, "%s", libFileNames[LIB_FILE_CYGWIN]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1072:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name2, "%s", libFileNames[LIB_FILE_CYGWIN_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1076:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s/%s", targetDir, libFileNames[LIB_FILE_OS390BATCH_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1078:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "cd %s && %s %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1091:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "cd %s && %s %s.x && %s %s %s.x",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1106:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name1, "%s%s%s", libFileNames[LIB_FILE], FILE_EXTENSION_SEP, pkgDataFlags[SO_EXT]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1107:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name2, "%s", libFileNames[LIB_FILE_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1115:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name1, "%s%s%s", libFileNames[LIB_FILE], FILE_EXTENSION_SEP, pkgDataFlags[SO_EXT]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1116:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name2, "%s", libFileNames[LIB_FILE_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1119:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1154:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s.lib %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1167:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1182:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1217:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s %s", pkgDataFlags[INSTALL_CMD], fileName, installDir);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1219:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s %s %s", WIN_INSTALL_CMD, fileName, installDir, WIN_INSTALL_CMD_FLAGS);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1290:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s %s %s", WIN_INSTALL_CMD, srcDir, installDir, WIN_INSTALL_CMD_FLAGS);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1311:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_VERSION], "%s%s%s.%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1317:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s %s%s %s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1331:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s%s", 
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1343:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1392:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s %s%s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1401:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "%s %s%s", 
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1427:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1435:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1443:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s%s;%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1452:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1476:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1479:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(PDS_Name, getenv("ICU_PDS_NAME_SUFFIX"));
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1481:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1485:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1491:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1494:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(PDS_Name, getenv("ICU_PDS_NAME_SUFFIX"));
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1496:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1500:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1507:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(PDS_LibName,"%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1513:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "%s %s -o %s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1557:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd.getAlias(), "%s %s -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1617:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(icudtAll, "%s%s%sall.c",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1661:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "%s %s -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1672:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer, "%s",tempObjectFile);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1685:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(dataDirName, "%s%s", DATA_PREFIX[n], PKGDATA_FILE_SEP_STRING);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1734:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "#include \"%s\"\n", gencmnFile);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1744:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1771:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s -I. -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1822:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(staticLibFilePath, "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1829:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(staticLibFilePath, "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1837:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s\"%s\" \"%s\"",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1877:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(resFilePath, "\"%s\"", tmpResFilePath);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1907:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s\"%s\" %s %s\"%s\" \"%s\" %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2019:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(tmpbuffer, "%s%s ", o->entryName, UDATA_CMN_INTERMEDIATE_SUFFIX);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2190:21:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    p.adoptInstead( popen(cmdBuf.data(), "r") );
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2264:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s -o %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2270:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(optMatchArch, "%s", obj);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:65:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf((FILE *)context, fmt, args);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:261:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, path);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:277:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s, name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:440:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pkgPrefix, p);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:1047:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(items[idx].name, name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:338:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    count = snprintf(
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:364:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    count = snprintf(
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:414:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(entry, optName);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:341:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer,
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:353:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer, "extern const char\n    %s%s[]", symPrefix?symPrefix:"", files[0].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:356:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer, ",\n    %s%s[]", symPrefix?symPrefix:"", files[i].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:361:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:393:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer, "        { \"%s\", %s%s }", files[0].basename, symPrefix?symPrefix:"", files[0].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:396:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer, ",\n        { \"%s\", %s%s }", files[i].basename, symPrefix?symPrefix:"", files[i].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:52:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf((FILE *)context, fmt, args);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:607:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( buf, CLDR_TRAC_URL );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:608:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( buf, ticket+strlen(CLDR_TICKET_PREFIX) );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:610:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( buf, ICU_TRAC_URL );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:611:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( buf, ticket );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:61:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(f, header, filename, buffer);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:63:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(f, header, filename, generator);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:91:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer,
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:150:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, prefix, (long)length);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:175:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, value<=9 ? "%lu" : "0x%lx", (unsigned long)value);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:299:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const uint16_t %s_trieIndex[%%ld]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:300:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line2, "static const uint%d_t %s_trieData[%%ld]={\n", (int)width, name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:302:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const UCPTrie %s_trie={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:303:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line2, "%s_trieIndex", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:304:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line3, "%s_trieData", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:317:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, prefix, (long)length);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:338:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, c<0x20 ? "%u" : "'%c'", c);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:106:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	(void) sprintf(result,
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:113:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		return strcpy(buf, result);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/ialloc.c:24:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(result + oldsize, new);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:371:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(fullname, p);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:373:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			(void) strcat(fullname, name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:381:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (doaccess && access(name, R_OK) != 0)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1217:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(lcl_TZname, name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1238:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(lclptr->chars, gmt);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/scheck.c:60:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(string, fbuf, &dummy) != 1)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:270:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			(void) fprintf(stderr, tformat(), *tp);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:280:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			(void) fprintf(stderr, tformat(), t);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:544:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(&fakeenv[0][3], argv[i]);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:561:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(path, dirarg);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:564:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(path, argv[i]);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:808:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			(void) printf(tformat(), t);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1047:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, basedir);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1050:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(path, relpath);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1062:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(pzonename, relpath);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1084:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(subpath, relpath);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1086:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(subpath, dir->d_name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1088:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(subpath, dir->d_name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:482:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void ATTRIBUTE_FORMAT((printf, 1, 0))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:491:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, string, args);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:499:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void ATTRIBUTE_FORMAT((printf, 1, 2))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:508:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void ATTRIBUTE_FORMAT((printf, 1, 2))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:791:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    && access(fromname, F_OK) == 0 && !itsdir(fromname)) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:877:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	accres = access(myname, F_OK);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1089:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(string, scheck(string, "%"SCNdZIC), &hh) == 1)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1091:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	else if (sscanf(string, scheck(string, "%"SCNdZIC":%d"), &hh, &mm) == 2)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1093:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	else if (sscanf(string, scheck(string, "%"SCNdZIC":%d:%d"),
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1281:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(cp, scheck(cp, "%"SCNdZIC), &year) != 1) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1316:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(cp, scheck(cp, "%d"), &day) != 1 ||
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1456:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	} else if (sscanf(cp, scheck(cp, "%"SCNdZIC), &rp->r_loyear) != 1) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1478:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	} else if (sscanf(cp, scheck(cp, "%"SCNdZIC), &rp->r_hiyear) != 1) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1531:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		if (sscanf(ep, scheck(ep, "%d"), &rp->r_dayofmonth) != 1 ||
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1688:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(fullname, "%s/%s", directory, name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1849:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				(void) strcpy(&thischars[(int) thischarcnt],
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1956:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(abbr, format);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1957:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		else	(void) sprintf(abbr, format, letters);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1959:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(abbr, slashp + 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2602:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					(void) strcpy(startbuf, zp->z_format);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2692:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(chars, &chars[abbrinds[type]]);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2837:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%s %d %s", yitcommand, year, type);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2838:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	result = system(buf);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:3103:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(&chars[charcnt], string);
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:533:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp("perf", const_cast<char**>(args.begin()));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:346:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	  || access (mnt.mnt_dir, W_OK))
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c:52:57:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug(lvl, x...) do { if (lvl <= DEBUG_LEVEL) { printf(x); } } while (0)
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double_va.c:20:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	*(ffi_arg*)resp = printf(format, doubleValue);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double_va.c:47:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ffi_call(&cif, FFI_FN(printf), &res, args);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble_va.c:20:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	*(ffi_arg*)resp = printf(format, ldValue);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble_va.c:47:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ffi_call(&cif, FFI_FN(printf), &res, args);
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:37:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#  define sprintf_s(b, size, fmt, ...) sprintf((b), (fmt), __VA_ARGS__)
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:82:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(buf, sizeof(buf), format, args);
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:86:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(buf);
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:90:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define vprof_printf printf
data/mozjs78-78.4.0/js/src/editline/editline.h:88:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char	*strcat();
data/mozjs78-78.4.0/js/src/editline/editline.h:91:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char	*strcpy();
data/mozjs78-78.4.0/js/src/editline/sysunix.c:146:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(p, S_ISDIR(Sb.st_mode) ? "/" : " ");
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:872:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, " %6" PRIi64, static_cast<int64_t>(time.ToMicroseconds()));
data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp:331:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp:334:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  TraceAtoms(trc, access);
data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp:336:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  jit::JitRuntime::Trace(trc, access);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:275:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cursor, fragments[i].get());
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:280:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(cursor, separator);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:612:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(gcDebugFile, fmt, args);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:1616:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, " %6" PRIi64, static_cast<int64_t>(time.ToMilliseconds()));
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:1638:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, " %6" PRIi64,
data/mozjs78-78.4.0/js/src/jit/CacheIRCompiler.cpp:5257:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  masm.printf(str);
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:396:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void JitRuntime::Trace(JSTracer* trc, const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:405:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Zone* zone = trc->runtime()->atomsZone(access);
data/mozjs78-78.4.0/js/src/jit/IonScript.h:486:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ncode, code);
data/mozjs78-78.4.0/js/src/jit/JitRealm.h:303:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  static void Trace(JSTracer* trc, const js::AutoAccessAtomsZone& access);
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:165:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(jsonBuffer, bufferLength,
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:541:7:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out.vprintf(fmt, ap);
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:550:7:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out.vprintf(fmt, ap);
data/mozjs78-78.4.0/js/src/jit/MIR.cpp:1139:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      out.printf(toBoolean() ? "true" : "false");
data/mozjs78-78.4.0/js/src/jit/MIR.cpp:1145:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      out.printf("0x%" PRIx64, uint64_t(toInt64()));
data/mozjs78-78.4.0/js/src/jit/MIR.cpp:1342:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out.printf(" 0x%" PRIxPTR, value().asValue());
data/mozjs78-78.4.0/js/src/jit/MIR.h:11518:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmLoad(const wasm::MemoryAccessDesc& access, MIRType resultType)
data/mozjs78-78.4.0/js/src/jit/MIR.h:11519:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : MVariadicInstruction(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/MIR.h:11529:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                        MDefinition* base, const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11531:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MWasmLoad* load = new (alloc) MWasmLoad(access, resultType);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11544:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11559:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmStore(const wasm::MemoryAccessDesc& access)
data/mozjs78-78.4.0/js/src/jit/MIR.h:11560:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : MVariadicInstruction(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/MIR.h:11570:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11572:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MWasmStore* store = new (alloc) MWasmStore(access);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11586:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11610:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasm::MemoryAccessDesc access() const {
data/mozjs78-78.4.0/js/src/jit/MIR.h:11743:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmCompareExchangeHeap(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11746:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access_(access),
data/mozjs78-78.4.0/js/src/jit/MIR.h:11749:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    setResultType(ScalarTypeToMIRType(access.type()));
data/mozjs78-78.4.0/js/src/jit/MIR.h:11759:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11763:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        new (alloc) MWasmCompareExchangeHeap(access, bytecodeOffset);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11777:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11796:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmAtomicExchangeHeap(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11799:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access_(access),
data/mozjs78-78.4.0/js/src/jit/MIR.h:11802:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    setResultType(ScalarTypeToMIRType(access.type()));
data/mozjs78-78.4.0/js/src/jit/MIR.h:11812:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11815:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        new (alloc) MWasmAtomicExchangeHeap(access, bytecodeOffset);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11830:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11850:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11854:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access_(access),
data/mozjs78-78.4.0/js/src/jit/MIR.h:11857:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    setResultType(ScalarTypeToMIRType(access.type()));
data/mozjs78-78.4.0/js/src/jit/MIR.h:11867:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                   const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11870:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        new (alloc) MWasmAtomicBinopHeap(op, access, bytecodeOffset);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11886:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.cpp:2018:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void MacroAssembler::printf(const char* output) {
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.cpp:2047:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void MacroAssembler::printf(const char* output, Register value) {
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2540:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoad(const wasm::MemoryAccessDesc& access, Operand srcAddr,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2542:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64(const wasm::MemoryAccessDesc& access, Operand srcAddr,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2544:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStore(const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2546:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2555:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoad(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2558:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2561:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStore(const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2564:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2569:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2578:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoadFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2585:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2592:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStore(const wasm::MemoryAccessDesc& access, Register value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2598:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStoreFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2604:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2834:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2839:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2844:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2850:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2856:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2860:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2864:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2870:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2876:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2880:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2884:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2888:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2892:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2897:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2908:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2912:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2916:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2920:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2924:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2929:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2943:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2947:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2959:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2964:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2974:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2978:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2989:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2994:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2999:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3003:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3009:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3781:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  void printf(const char* output);
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3782:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  void printf(const char* output, Register value);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:737:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:744:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (!IndexOf(access, &index)) {
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:746:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     "has a load element with a non-trivial index\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:751:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     "has a load element with an out-of-bound index\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:767:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:774:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (!IndexOf(access, &index)) {
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:776:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     "has a store element with a non-trivial index\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:782:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:790:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:810:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (IsElementEscaped(access, arraySize)) {
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:811:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          JitSpewDef(JitSpew_Escape, "is indirectly escaped by\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:817:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        JitSpewDef(JitSpew_Escape, "is escaped by\n", access);
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:176:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool js::jit::IsUnaligned(const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:177:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.align()) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:181:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Float64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:181:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Float64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:185:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:185:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.h:152:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool IsUnaligned(const wasm::MemoryAccessDesc& access);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1866:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().offset() || mir->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1866:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().offset() || mir->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1874:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), HeapReg, ptr, ptr, ToOutRegister64(lir));
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1876:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1894:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadI64(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1899:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (mir->access().byteSize() == 8) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1902:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadFP(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1905:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoad(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1935:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1939:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().offset() || accessType == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1947:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(),
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1951:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(mir->access(),
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1972:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        mir->access(),
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1978:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStoreFP(mir->access(), value, HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1981:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStore(mir->access(), valOrTmp, HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2083:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2091:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange(mir->access(), srcAddr, oldval, newval, out);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2100:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2103:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange(mir->access(), srcAddr, value, output);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2117:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2118:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp(mir->access(), op, ToRegister(value), srcAddr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2133:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2134:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicEffectOp(mir->access(), op, ToRegister(value), srcAddr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2908:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->mir()->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2909:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicLoad64(lir->mir()->access(), addr, tmp, output);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2917:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->mir()->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2918:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange64(lir->mir()->access(), addr, value, tmp);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2927:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->mir()->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2928:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange64(lir->mir()->access(), addr, expected, replacement,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2937:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2939:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp64(lir->access(), lir->operation(), value, addr, tmp,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2948:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2949:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange64(lir->access(), addr, value, out);
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:546:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      const wasm::MemoryAccessDesc& access, AtomicOp op)
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:547:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access), op_(op) {
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:556:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:570:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access)
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:571:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:578:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:558:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:558:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:568:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:569:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MOZ_ASSERT(!ins->access().isAtomic());
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:601:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:601:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:609:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:620:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:620:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:631:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:632:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MOZ_ASSERT(!ins->access().isAtomic());
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:660:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:660:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:670:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:853:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:864:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:877:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:880:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ins->access());
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:887:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:896:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:899:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        tempFixed(FetchOpTmpLo), tempFixed(FetchOpTmpHi), ins->access(),
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:907:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4770:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4773:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, output,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4777:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4780:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4780:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4781:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(), output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4784:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4787:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, value, Register64::Invalid(), memoryBase, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4791:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4794:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(!access.isAtomic());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4795:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(), value, memoryBase, ptr, ptrScratch);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4798:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4802:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedLoadImpl(access, memoryBase, ptr, ptrScratch,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4807:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4812:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(outFP),
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4816:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4820:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(),
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4824:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4829:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedStoreImpl(access, FloatRegister(), Register64::Invalid(),
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4833:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4837:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedStoreImpl(access, floatVal, Register64::Invalid(), memoryBase,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4841:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4845:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedStoreImpl(access, FloatRegister(), val64, memoryBase, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4901:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4946:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4947:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4988:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4991:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4991:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4991:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4995:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4998:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4998:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4998:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5004:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5046:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5047:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5071:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5074:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5074:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5074:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5078:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5081:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5081:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5081:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5106:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5146:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5147:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5199:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5203:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5203:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5203:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5207:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5211:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5211:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5211:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5229:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5261:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5262:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5300:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5303:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5303:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5303:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5307:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5310:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5310:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5310:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5316:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                             const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5322:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5328:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5331:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5334:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5337:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5340:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5343:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5348:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                              const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5370:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5371:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5389:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5394:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5394:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5398:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5403:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5403:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5415:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                 const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5431:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5435:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5443:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5446:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5449:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5452:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5455:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5460:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5482:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5486:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5517:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5520:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5524:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5527:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5531:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5956:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::wasmLoadImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5962:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5965:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type type = access.type();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5977:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5979:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5988:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5994:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5998:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6016:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6020:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6024:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6027:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::wasmStoreImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6033:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6036:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6037:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type type = access.type();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6047:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6055:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6061:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6072:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6080:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6084:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6088:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6095:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6107:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6110:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type type = access.type();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6117:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6119:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6124:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedLoad(&access, /*signed*/ false, /*size*/ 4, ptr, tmp, tmp2);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6132:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedLoad(&access, /*signed=*/false, /*size=*/4, ptr, tmp, tmp3,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6142:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedLoad(&access, /*signed=*/false, /*size=*/4, ptr, tmp,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6155:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        emitUnalignedLoad(&access, isSigned, byteSize, ptr, tmp, out64.low);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6162:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        emitUnalignedLoad(&access, isSigned, byteSize, ptr, tmp, outAny.gpr());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6173:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6177:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister floatValue,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6187:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6190:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6202:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6209:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, /*size=*/4, ptr, val64.high, /*offset=*/4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6212:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, byteSize, ptr, val64.low);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6219:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, /*size=*/4, ptr, valOrTmp, /*offset=*/4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6224:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, /*size=*/4, ptr, valOrTmp);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6228:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    emitUnalignedStore(&access, byteSize, ptr, valOrTmp);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6231:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6234:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::emitUnalignedLoad(const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6269:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6270:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(*access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6283:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::emitUnalignedStore(const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6316:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (i == (int)byteSize - 1 && access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6317:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(*access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:541:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadImpl(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:546:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreImpl(const wasm::MemoryAccessDesc& access, AnyRegister valAny,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:552:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoadImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:561:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStoreImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:574:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void emitUnalignedLoad(const wasm::MemoryAccessDesc* access, bool isSigned,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:584:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void emitUnalignedStore(const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/disasm/Disasm-arm.cpp:47:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = vsnprintf(str.start(), str.length(), format, args);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:310:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerCompat::wasmLoadImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:314:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:325:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:335:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, asMasm().currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:336:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:377:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:380:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerCompat::wasmStoreImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:384:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:395:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:405:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, asMasm().currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:406:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:437:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1367:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1370:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, output,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1374:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1377:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(), output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1380:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1383:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, value, Register64::Invalid(), memoryBase, ptr,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1387:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1390:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(), value, memoryBase, ptr, ptrScratch);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1529:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1545:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1546:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1560:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1561:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1575:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1576:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1590:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1591:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1623:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1643:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LoadExclusive(masm, access, type, targetWidth, ptr, output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1655:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1671:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LoadExclusive(masm, access, type, targetWidth, ptr, output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1680:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1697:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LoadExclusive(masm, access, type, targetWidth, ptr, output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1761:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1764:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1764:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1764:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1768:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1771:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1771:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1771:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1789:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1792:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1792:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1792:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1796:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1799:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1799:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1799:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1819:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1823:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1823:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1823:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1827:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1831:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1831:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1831:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1835:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1838:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1838:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1838:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1842:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1845:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1845:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1845:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1849:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1854:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1854:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1858:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1863:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1863:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1867:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1870:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1870:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1874:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1877:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1877:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1881:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1885:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1885:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1889:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1893:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1893:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.h:1999:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadImpl(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.h:2002:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreImpl(const wasm::MemoryAccessDesc& access, AnyRegister valany,
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:233:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, fmt_, value);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3490:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  buffer_pos_ += vsnprintf(&buffer_[buffer_pos_], buffer_size_ - buffer_pos_,
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.h:605:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(form_buffer_, sizeof(form_buffer_), string,
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp:232:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(stderr, error_message, name);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp:233:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(output_stream_, error_message, name);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3967:41:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        case kPrintfArgW: part_result = printf(chunks[i], wreg(pcs_r++)); break;
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3968:41:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        case kPrintfArgX: part_result = printf(chunks[i], xreg(pcs_r++)); break;
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3969:41:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        case kPrintfArgD: part_result = printf(chunks[i], dreg(pcs_f++)); break;
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1479:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
inline bool IsUnaligned(const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1480:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.align()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1485:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Int64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1485:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Int64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1490:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1490:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1539:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1541:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedLoadFP(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1546:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedLoad(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1551:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), HeapReg, ToRegister(lir->ptr()), ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1571:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1572:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (mir->access().type() == Scalar::Float32 ||
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1573:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        mir->access().type() == Scalar::Float64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1574:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedStoreFP(mir->access(), ToFloatRegister(lir->value()),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1578:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedStore(mir->access(), ToRegister(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1583:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(mir->access(), ToAnyRegister(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1603:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (mir->access().type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1718:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (mir->access().type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1821:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1830:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange(mir->access(), srcAddr, oldval, newval, valueTemp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1838:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1845:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange(mir->access(), srcAddr, value, valueTemp, offsetTemp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1859:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1861:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp(mir->access(), mir->operation(),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1877:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1878:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicEffectOp(mir->access(), mir->operation(),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2192:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2195:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange64(lir->mir()->access(), addr, oldValue, newValue,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2203:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2206:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange64(lir->mir()->access(), addr, value, output);
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2218:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2222:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp64(lir->mir()->access(), lir->mir()->operation(), value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:336:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:339:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:348:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:358:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:365:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:374:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:387:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:389:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:393:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:404:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:412:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:414:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:425:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:436:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:486:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().offset() == 0);
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:511:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().offset() == 0);
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:622:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:634:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().byteSize() < 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:650:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:661:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().byteSize() < 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:676:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:691:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().byteSize() < 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:496:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register dest, const BaseIndex& src,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:547:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:651:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register data, const BaseIndex& dest,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:692:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1850:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1853:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, output, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1856:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1860:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(output), tmp);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1863:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1870:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(output), tmp1);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1873:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1876:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, value, memoryBase, ptr, ptrScratch, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1879:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1883:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(value), memoryBase, ptr, ptrScratch, tmp);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1886:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1890:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(floatValue), memoryBase, ptr, ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1895:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1897:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1907:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1911:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1941:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1945:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().loadUnalignedFloat32(access, address, tmp, output.fpu());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1947:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().loadUnalignedDouble(access, address, tmp, output.fpu());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1950:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_load_unaligned(access, output.gpr(), address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1957:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1969:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1970:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1974:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1976:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1986:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1990:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2023:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2027:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().storeUnalignedFloat32(access, value.fpu(), tmp, address);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2029:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().storeUnalignedDouble(access, value.fpu(), tmp, address);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2032:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_store_unaligned(access, value.gpr(), address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2039:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2052:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2053:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2066:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2095:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2096:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2126:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2127:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2191:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2196:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2196:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2196:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2200:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2205:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2205:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2205:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2211:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2240:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2241:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2278:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2279:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2331:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2335:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2335:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2335:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2339:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2343:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2343:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2343:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2349:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2378:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2379:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2427:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2428:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2511:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2516:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2516:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2516:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2520:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2525:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2525:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2525:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2531:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2559:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2560:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2608:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2609:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2657:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2662:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2662:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2662:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2666:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2671:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2671:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2671:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:104:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void ma_load_unaligned(const wasm::MemoryAccessDesc& access, Register dest,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:114:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void ma_store_unaligned(const wasm::MemoryAccessDesc& access, Register data,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:232:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadImpl(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:235:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreImpl(const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:302:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:303:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:307:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()), ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:329:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:330:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStoreI64(mir->access(), ToRegister64(lir->value()),
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:334:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(), ToRegister64(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:549:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:553:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicLoad64(lir->mir()->access(), addr, Register64::Invalid(),
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:561:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:565:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicStore64(lir->mir()->access(), addr, tmp, value);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1077:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1087:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1091:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1098:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1102:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1108:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1123:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1230:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1247:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1251:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1276:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2348:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2351:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2354:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2358:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, tmp);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2361:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2364:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2367:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2371:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, tmp);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2375:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2377:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2387:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2390:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2418:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2421:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_load_unaligned(access, output.low, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2431:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_load_unaligned(access, output.low, address, tmp, SizeWord,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2434:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          access, output.high,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2441:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2446:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2455:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2459:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2461:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2465:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register64 value, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2467:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2477:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2479:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2507:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2510:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_store_unaligned(access, value.low, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2515:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          access, value.high,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2518:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_store_unaligned(access, value.low, address, tmp, SizeWord,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2524:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2528:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2533:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2536:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2540:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2545:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2573:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2579:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2588:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2591:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2594:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2597:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2602:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const T& mem, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2606:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(asMasm(), access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2615:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const Address& mem, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2618:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& mem, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2623:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2634:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2647:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2652:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2655:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2660:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2665:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                 const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2671:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2681:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2684:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2687:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2690:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2695:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2700:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2740:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2744:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2747:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2751:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:574:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicStore64(const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:647:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:651:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:720:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:723:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:755:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64Impl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:758:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64Impl(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:735:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(llvmcmd,
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:740:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system(llvmcmd)) {
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:342:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:343:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:347:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()), ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:369:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:370:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStoreI64(mir->access(), ToRegister64(lir->value()),
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:374:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(), ToRegister64(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:995:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1009:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1014:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1028:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1138:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1153:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1157:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1173:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2130:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2133:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2136:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2140:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, tmp);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2143:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2146:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2149:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2153:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, tmp);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2267:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2269:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2279:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2282:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2309:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2311:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().ma_load_unaligned(access, output.reg, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2317:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2321:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2322:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2326:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register64 value, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2328:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2338:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2340:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2368:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2370:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().ma_store_unaligned(access, value.reg, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2376:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2380:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2381:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2386:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2394:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2398:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2407:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2412:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2417:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2420:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2425:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2430:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                             const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2436:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2440:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2448:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2451:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2454:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2457:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2460:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2465:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2472:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2476:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2502:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2505:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2509:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2512:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2516:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:661:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:664:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:727:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:730:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:767:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64Impl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:770:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64Impl(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:545:20:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (stopAtStr && sscanf(stopAtStr, "%" PRIi64, &stopAt) == 1) {
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:642:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    return sscanf(desc, "%" PRIu64, reinterpret_cast<uint64_t*>(value)) == 1;
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:644:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  return sscanf(desc, "%" PRIi64, value) == 1;
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:768:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(llvmcmd,
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:773:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system(llvmcmd)) {
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:897:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf("  %p:  0x%016" PRIx64 " %20" PRIi64, cur, *cur, *cur);
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:580:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void append(const wasm::MemoryAccessDesc& access, uint32_t pcOffset) {
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:581:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    appendOutOfBoundsTrap(access.trapOffset(), pcOffset);
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:587:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void append(wasm::SymbolicAccess access) {
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:588:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    enoughMemory_ &= symbolicAccesses_.append(access);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:73:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(fmt2, sizeof(prefix_fmt), prefix_fmt,
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:75:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fmt2, fmt);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:88:15:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printer_->vprintf(fmt, va);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:153:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer, bufsize, "%" PRIi64, doc.value.i64);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:156:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer, bufsize, "%" PRIu64, doc.value.u64);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:374:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void CodeGeneratorX64::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:377:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:383:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:384:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:408:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:410:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(access, ToAnyRegister(value), dstAddr);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:423:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = mir->access().offset();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:432:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), srcAddr, ToOutRegister64(ins));
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:434:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), srcAddr, ToAnyRegister(ins->output()));
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:445:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access = mir->access();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:447:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:456:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStore(access, value, dstAddr);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:474:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:475:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:478:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmCompareExchange64(mir->access(), srcAddr, Register64(oldval),
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:481:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmCompareExchange(mir->access(), srcAddr, oldval, newval,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:493:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:495:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:498:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicExchange64(mir->access(), srcAddr, Register64(value),
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:501:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicExchange(mir->access(), srcAddr, value,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:517:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:523:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:529:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp64(mir->access(), op, val, srcAddr, tmp, out);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:531:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, Imm32(ToInt32(value)), srcAddr,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:534:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, ToRegister(value), srcAddr, temp,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:548:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:551:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:555:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp64(mir->access(), op, val, srcAddr);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:563:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, c, srcAddr, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:565:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, ToRegister(value), srcAddr,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.h:26:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStore(const wasm::MemoryAccessDesc& access, const LAllocation* value,
data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp:197:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (ins->access().type()) {
data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp:276:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool canTakeConstant = ins->access().type() != Scalar::Int64;
data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp:1263:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buf, "shuffle -> permute 16x8%s%s%s",
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:605:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:607:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:609:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:610:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:645:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:648:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:650:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:652:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:653:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:687:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:690:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:692:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:694:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:695:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:727:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:918:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:927:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:931:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:940:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:944:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:950:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:954:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:960:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:966:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:973:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:974:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:982:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:983:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:989:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:990:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1013:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1017:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, &access, op, value.reg, mem, temp.reg, output.reg);
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1020:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1024:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, &access, op, value.reg, mem, temp.reg, output.reg);
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1027:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1030:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp:381:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(mir->access().offset() == 0);
data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp:410:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmLoad(mir->access(), srcAddr, out);
data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp:475:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmStore(mir->access(), ToAnyRegister(value), dstAddr);
data/mozjs78-78.4.0/js/src/jit/x86-shared/Lowering-x86-shared.cpp:323:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (ins->access().type()) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:992:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1001:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1002:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1033:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1036:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1036:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1039:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1042:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1042:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1047:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1056:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1057:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1089:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1092:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1092:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1095:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1098:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1098:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1122:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1131:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) masm.append(*access, masm.size()); \
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1131:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) masm.append(*access, masm.size()); \
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1152:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1152:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1176:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1176:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1197:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1197:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1247:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1251:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1251:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1254:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1258:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1258:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1261:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1265:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1265:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1268:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1272:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1272:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1277:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1280:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1281:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1353:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1357:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1357:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1360:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1364:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1364:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1367:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1371:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1371:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1374:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1378:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1378:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:249:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = mir->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:265:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MOZ_ASSERT_IF(mir->access().isAtomic(),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:266:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                  mir->access().type() != Scalar::Int64);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:267:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), srcAddr, ToOutRegister64(ins));
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:269:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), srcAddr, ToAnyRegister(ins->output()));
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:281:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = mir->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:296:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:299:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(), value, dstAddr);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:302:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(mir->access(), value, dstAddr);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:323:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:327:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange(mir->access(), memAddr, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:339:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:343:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange(mir->access(), memAddr, value, output);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:358:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:363:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, Imm32(ToInt32(value)), memAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:366:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, ToRegister(value), memAddr, temp,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:382:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:387:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, Imm32(ToInt32(value)), memAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:390:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, ToRegister(value), memAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:396:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = ins->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:408:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicLoad64(ins->mir()->access(), srcAddr, Register64(ecx, ebx),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:413:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = ins->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:427:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(ins->mir()->access(), masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:433:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    T* ins, const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:434:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(access.offset() < wasm::MaxOffsetGuardLimit);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:439:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                  access.offset());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:453:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:462:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitWasmStoreOrExchangeAtomicI64(ins, ins->mir()->access());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:469:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitWasmStoreOrExchangeAtomicI64(ins, ins->access());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:473:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = ins->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:500:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp64(ins->access(), ins->operation(), valueAddr, srcAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.h:32:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                        const wasm::MemoryAccessDesc& access);
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:265:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access)
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:266:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:275:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:288:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      const wasm::MemoryAccessDesc& access, AtomicOp op)
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:289:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access), op_(op) {
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:298:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:264:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:268:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!(base->toConstant()->isInt32(0) || access.offset() == 0)) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:271:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:277:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      v = access.offset();
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:298:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:298:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:309:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!base->isConstant() || !OptimizableConstantAccess(base, ins->access())) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:327:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = ins->access().type();
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:347:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:347:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:357:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!base->isConstant() || !OptimizableConstantAccess(base, ins->access())) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:362:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (ins->access().type()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:405:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:416:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:418:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool byteArray = byteSize(ins->access().type()) == 1;
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:448:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:452:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        useInt64Fixed(ins->value(), Register64(ecx, ebx)), ins->access());
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:466:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (byteSize(ins->access().type()) == 1) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:480:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:484:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            ins->access(), ins->operation());
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:491:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:493:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool byteArray = byteSize(ins->access().type()) == 1;
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:581:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:586:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:588:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:589:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:621:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:624:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:627:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:627:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:631:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:633:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:634:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:679:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:695:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:698:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:703:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:705:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:706:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:735:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:738:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:741:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(!access.isAtomic());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:745:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:748:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:754:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access, const T& address,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:766:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:770:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:773:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:776:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:779:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:784:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:793:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:797:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:802:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expected, replacement, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:805:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:810:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expected, replacement, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:815:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                 const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:828:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:833:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:836:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:839:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:842:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:847:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:859:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(access, masm.size());                      \
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:892:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:896:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:899:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:903:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jsdate.cpp:2980:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, js_InvalidDate_str);
data/mozjs78-78.4.0/js/src/jsnum.cpp:989:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, rt->thousandsSeparator);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1002:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, rt->decimalSeparator);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1005:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, nint + 1);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1008:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, nint);
data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc:25:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(format, arguments);
data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc:32:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(out, format, arguments);
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:923:16:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int result = system(command.get());
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:968:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  execvp("sh", (char* const*)cmd);
data/mozjs78-78.4.0/js/src/shell/js.cpp:6088:7:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execv(sArgv[0], argv.get());
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:60:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, args);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:182:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      size_t chars = printf(fmt, arg->longflag);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:218:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->shortflag, opt->longflag,
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:221:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->longflag, opt->asValued()->metavar);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:225:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->shortflag, opt->longflag);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:227:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->longflag);
data/mozjs78-78.4.0/js/src/util/DoubleToString.cpp:304:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, !word1(d) && !(word0(d) & Frac_mask) ? "Infinity" : "NaN");
data/mozjs78-78.4.0/js/src/vm/AtomsTable.h:188:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void tracePinnedAtoms(JSTracer* trc, const AutoAccessAtomsZone& access);
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3646:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    out.printf("%" PRIu64, d);
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3652:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        out.printf("%.8" PRIX32, uint32_t(d));
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3654:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        out.printf("%.16" PRIX64, d);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:639:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  std::strcpy(linkName, tz);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:668:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      std::strcpy(linkName, linkTarget);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:679:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      std::strcpy(linkName, linkTarget);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:692:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    std::strcat(linkName, linkTarget);
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2086:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2087:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, GET, &v, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2091:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2164:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2165:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, GET, vp, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2169:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2233:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2234:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, GET, vp, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2238:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2274:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2276:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, SET, &valCopy, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2280:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:420:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(message, nbytes, defaultErrorMessage, errorNumber);
data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp:418:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp:428:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void js::TraceAtoms(JSTracer* trc, const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp:431:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    rt->atoms().tracePinnedAtoms(trc, access);
data/mozjs78-78.4.0/js/src/vm/JSAtom.h:47:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void TraceAtoms(JSTracer* trc, const AutoAccessAtomsZone& access);
data/mozjs78-78.4.0/js/src/vm/JSContext.h:362:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const JS::Zone* atomsZone(const js::AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/JSContext.h:363:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return runtime_->atomsZone(access);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:93:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:102:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:114:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:123:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRId32, value);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:136:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRIu32, value);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:141:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRId64, value);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:146:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRIu64, value);
data/mozjs78-78.4.0/js/src/vm/JSObject.cpp:3264:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, bufsize, pattern, slotname);
data/mozjs78-78.4.0/js/src/vm/JSObject.cpp:3272:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buf, bufsize, "%" PRId32, JSID_TO_INT(propid));
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:52:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
bool GenericPrinter::printf(const char* fmt, ...) {
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:55:12:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool r = vprintf(fmt, va);
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:60:22:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
bool GenericPrinter::vprintf(const char* fmt, va_list ap) {
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:235:12:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool r = vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/Printer.h:47:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool printf(const char* fmt, ...) MOZ_FORMAT_PRINTF(2, 3);
data/mozjs78-78.4.0/js/src/vm/Printer.h:48:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool vprintf(const char* fmt, va_list ap) MOZ_FORMAT_PRINTF(2, 0);
data/mozjs78-78.4.0/js/src/vm/Runtime.h:765:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const JS::Zone* atomsZone(const js::AutoAccessAtomsZone& access) const {
data/mozjs78-78.4.0/js/src/vm/Runtime.h:768:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  JS::Zone* atomsZone(const js::AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/SymbolType.cpp:92:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    out.printf(code_ == SymbolCode::InSymbolRegistry ? "Symbol.for("
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:82:33:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  char* rest = filename.get() + sprintf(filename.get(), "%s/", outdir);
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:85:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int ret = vsnprintf(rest, len, pattern, ap);
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:168:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      written = fprintf(out, R"(, "threadName":"%s")", threadName);
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:242:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, ap);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6407:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void bceCheckLocal(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6432:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void prepareMemoryAccess(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6488:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex prepareAtomicMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6492:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6499:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Address prepareAtomicMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6503:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6508:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Address prepareAtomicMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6515:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void needLoadTemps(const MemoryAccessDesc& access, RegI32* temp1,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6518:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6519:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6547:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool load(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6550:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6556:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoadI64(*access, srcAddr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6558:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoad(*access, srcAddr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6566:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoadI64(*access, srcAddr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6570:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoad(*access, srcAddr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6574:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(*access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6577:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoadI64(*access, HeapReg, ptr, ptr, dest.i64(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6581:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoadFP(*access, HeapReg, ptr, ptr, dest.f32(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6585:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoadFP(*access, HeapReg, ptr, ptr, dest.f64(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6589:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoad(*access, HeapReg, ptr, ptr, dest.i32(), temp1);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6596:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmLoadI64(*access, HeapReg, ptr, ptr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6598:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmLoad(*access, HeapReg, ptr, ptr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6603:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoadI64(*access, HeapReg, ptr, ptr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6605:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoad(*access, HeapReg, ptr, ptr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6614:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 needStoreTemp(const MemoryAccessDesc& access, ValType srcType) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6616:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(access) && srcType != ValType::I32) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6627:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool store(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6629:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6636:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(*access, src.any(), dstAddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6643:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStoreI64(*access, src.i64(), dstAddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6661:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStore(*access, value, dstAddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6664:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(*access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6667:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreI64(*access, src.i64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6671:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f32(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6675:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6680:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStore(*access, src.i32(), HeapReg, ptr, ptr, temp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6688:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStoreI64(*access, src.i64(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6690:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStore(*access, AnyRegister(src.i64().low), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6692:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStore(*access, src.any(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6696:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(*access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6699:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreI64(*access, src.i64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6703:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f32(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6707:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6711:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStore(*access, src.i32(), HeapReg, ptr, ptr, temp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6718:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStoreI64(*access, src.i64(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6720:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStore(*access, src.any(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6726:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStoreI64(*access, src.i64(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6728:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStore(*access, src.any(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6760:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicRMW32(const MemoryAccessDesc& access, T srcAddr, AtomicOp op,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6762:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6773:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicFetchOp(access, op, rv, srcAddr, temp, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6781:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicFetchOp(access, op, rv, srcAddr, temps[0], temps[1],
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6784:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicFetchOp(access, op, rv, srcAddr, temps[0], rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6796:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicRMW64(const MemoryAccessDesc& access, const T& srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6798:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp64(access, op, value, srcAddr, temp, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6808:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicCmpXchg32(const MemoryAccessDesc& access, T srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6811:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6822:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmCompareExchange(access, srcAddr, rexpect, rnew, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6830:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmCompareExchange(access, srcAddr, rexpect, rnew, temps[0],
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6833:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmCompareExchange(access, srcAddr, rexpect, rnew, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6848:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicXchg32(const MemoryAccessDesc& access, T srcAddr, RegI32 rv,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6850:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6857:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmAtomicExchange(access, srcAddr, rv, scratch);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6860:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmAtomicExchange(access, srcAddr, rv, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6869:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicExchange(access, srcAddr, rv, temps[0], temps[1],
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6872:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicExchange(access, srcAddr, rv, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7107:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicCmpXchg32(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7108:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicCmpXchg32(access, srcAddr, rexpect, rnew, getRd(), temps);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7172:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicCmpXchg64(const MemoryAccessDesc& access, T srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7176:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmCompareExchange64(access, srcAddr, rexpect,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7181:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicCmpXchg64(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7182:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmCompareExchange64(access, srcAddr, rexpect, rnew, getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7218:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicLoad64(const MemoryAccessDesc& access, T srcAddr, RegI32 ebx) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7220:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicLoad64(access, srcAddr, bc->specific_.ecx_ebx,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7225:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicLoad64(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7226:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicLoad64(access, srcAddr, RegI64::Invalid(), getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7317:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicRMW32(const MemoryAccessDesc& access, T srcAddr, AtomicOp op) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7318:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicRMW32(access, srcAddr, op, rv, getRd(), temps);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7399:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicRMW64(const MemoryAccessDesc& access, T srcAddr, AtomicOp op,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7402:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicRMW64(access, srcAddr, op, value, bc->specific_.ecx_ebx,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7407:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicRMW64(const MemoryAccessDesc& access, T srcAddr, AtomicOp op) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7408:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicRMW64(access, srcAddr, op, rv, temp, getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7459:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicXchg32(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7460:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicXchg32(access, srcAddr, rv, getRd(), temps);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7516:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicXchg64(const MemoryAccessDesc& access, T srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7520:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicExchange64(access, srcAddr, bc->specific_.ecx_ebx,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7525:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicXchg64(const MemoryAccessDesc& access, T srcAddr) const {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7526:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicExchange64(access, srcAddr, rv, getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7611:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 popMemoryAccess(MemoryAccessDesc* access, AccessCheck* check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7911:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool loadCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7914:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool storeCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:8066:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void emitAtomicXchg64(MemoryAccessDesc* access, WantResult wantResult);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10791:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
RegI32 BaseCompiler::popMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10823:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bceCheckLocal(access, check, local);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10867:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool BaseCompiler::loadCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10870:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  needLoadTemps(*access, &temp1, &temp2, &temp3);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10874:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10876:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rv = IsUnaligned(*access) ? needI32() : rp;
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10881:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10896:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10898:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10902:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10910:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10913:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10921:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10924:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10933:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10936:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10967:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10968:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return loadCommon(&access, AccessCheck(), type);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10971:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool BaseCompiler::storeCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10974:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 temp = needStoreTemp(*access, resultType);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10979:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10981:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10990:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10992:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11001:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11003:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11012:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11014:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11024:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11026:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11057:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11058:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return storeCommon(&access, AccessCheck(), resultType);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11415:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11422:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11425:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11426:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    regs.atomicCmpXchg32(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11445:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11450:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11451:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicCmpXchg64(access, memaddr, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11454:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11455:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicCmpXchg64(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11475:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11479:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return loadCommon(&access, AccessCheck(), type);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11490:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11495:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11496:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicLoad64(access, memaddr, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11499:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11500:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicLoad64(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11524:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11531:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11534:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11535:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    regs.atomicRMW32(access, memaddr, op);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11553:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11563:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11564:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicRMW64(access, memaddr, op, value, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11569:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11570:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicRMW64(access, memaddr, op);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11592:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11596:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return storeCommon(&access, AccessCheck(), type);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11604:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitAtomicXchg64(&access, WantResult(false));
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11622:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11627:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11630:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11631:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    regs.atomicXchg32(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11646:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitAtomicXchg64(&access, WantResult(true));
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11650:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BaseCompiler::emitAtomicXchg64(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11655:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11660:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11661:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicXchg64(*access, memaddr, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11664:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11665:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicXchg64(*access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11820:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11823:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11837:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11840:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11853:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11856:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11869:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11872:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11892:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11894:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11910:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11913:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11929:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11932:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11949:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11952:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12100:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12102:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12117:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12120:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12135:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12138:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12154:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12157:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13331:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13334:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13340:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13346:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13352:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13373:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(Scalar::Int64, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13375:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!loadCommon(&access, AccessCheck(), ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1474:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  for (auto& access : masm.symbolicAccesses()) {
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1475:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.target) {
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1486:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void* target = AddressOf(access.target, &abiType);
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1487:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    uint8_t* patchAt = codeBase + access.patchAt.offset();
data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp:703:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  for (const SymbolicAccess& access : code.symbolicAccesses) {
data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp:704:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    uint32_t patchAt = offsetInModule + access.patchAt.offset();
data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp:705:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!linkData_->symbolicLinks[access.target].append(patchAt)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:756:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:760:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* scalar = load(addr.base, &access, resultType);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:769:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:772:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* scalar = load(addr.base, &access, ValType::I64);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:822:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool needAlignmentCheck(MemoryAccessDesc* access, MDefinition* base,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:843:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void checkOffsetAndAlignmentAndBounds(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:865:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bool alignmentCheck = needAlignmentCheck(access, *base, &mustAdd);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:874:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      *base = computeEffectiveAddress(*base, access);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:893:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool isSmallerAccessForI64(ValType result, const MemoryAccessDesc* access) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:904:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       MemoryAccessDesc* access) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:918:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* load(MDefinition* base, MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:932:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:934:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          MWasmLoad::New(alloc(), memoryBase, base, *access, ToMIRType(result));
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:943:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void store(MDefinition* base, MemoryAccessDesc* access, MDefinition* v) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:956:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:957:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      store = MWasmStore::New(alloc(), memoryBase, base, *access, v);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:966:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                         MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:973:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:975:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:990:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      base, *access, oldv, newv, tlsPointer_);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:996:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1004:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* atomicExchangeHeap(MDefinition* base, MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1010:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1012:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1022:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                     base, *access, value, tlsPointer_);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1028:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1037:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               MemoryAccessDesc* access, ValType result,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1043:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1045:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1055:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  base, *access, value, tlsPointer_);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1061:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2902:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2904:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto* ins = f.load(addr.base, &access, type);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2922:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2925:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2938:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2941:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2962:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2965:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3123:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3126:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      f.atomicCompareExchangeHeap(addr.base, &access, type, oldValue, newValue);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3142:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3144:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto* ins = f.load(addr.base, &access, type);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3161:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3163:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto* ins = f.atomicBinopHeap(op, addr.base, &access, type, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3180:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3182:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3206:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(type == ValType::I32 ? Scalar::Int32 : Scalar::Int64,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3208:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* ptr = f.computeEffectiveAddress(addr.base, &access);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3263:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(Scalar::Int32, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3265:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* ptr = f.computeEffectiveAddress(addr.base, &access);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3299:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3301:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* ins = f.atomicExchangeHeap(addr.base, &access, type, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3369:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3370:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I64);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3380:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3381:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I32);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3390:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3391:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I32);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3400:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3401:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I32);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3415:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3417:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3423:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3425:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3431:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3433:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3440:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3442:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3652:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3653:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3659:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3660:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val2);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3666:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3667:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val4);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3674:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3675:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val8);
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:1175:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, format, fieldNo);
data/mozjs78-78.4.0/js/src/wasm/WasmTypes.cpp:995:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, ap);
data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h:278:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        [[gnu::format(printf, format_index, first_to_check)]]
data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h:281:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        __attribute__((format(printf, format_index, first_to_check)))
data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h:294:25:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        [[rscpp::format(wprintf, format_index, first_to_check)]]
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:78:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ZYAN_FPRINTF    fprintf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:79:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ZYAN_PRINTF     printf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:82:25:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define ZYAN_SCANF      scanf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:83:25:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define ZYAN_SSCANF     sscanf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:84:25:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define ZYAN_VSNPRINTF  vsnprintf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:115:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define ZYAN_STRCAT     strcat
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:119:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define ZYAN_STRCPY     strcpy
data/mozjs78-78.4.0/js/src/zydis/Zydis/SharedData.c:51:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacke