Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/musl-1.2.1/arch/aarch64/atomic_arch.h
Examining data/musl-1.2.1/arch/aarch64/bits/fcntl.h
Examining data/musl-1.2.1/arch/aarch64/bits/fenv.h
Examining data/musl-1.2.1/arch/aarch64/bits/float.h
Examining data/musl-1.2.1/arch/aarch64/bits/hwcap.h
Examining data/musl-1.2.1/arch/aarch64/bits/posix.h
Examining data/musl-1.2.1/arch/aarch64/bits/reg.h
Examining data/musl-1.2.1/arch/aarch64/bits/setjmp.h
Examining data/musl-1.2.1/arch/aarch64/bits/signal.h
Examining data/musl-1.2.1/arch/aarch64/bits/stat.h
Examining data/musl-1.2.1/arch/aarch64/bits/stdint.h
Examining data/musl-1.2.1/arch/aarch64/bits/user.h
Examining data/musl-1.2.1/arch/aarch64/crt_arch.h
Examining data/musl-1.2.1/arch/aarch64/fp_arch.h
Examining data/musl-1.2.1/arch/aarch64/kstat.h
Examining data/musl-1.2.1/arch/aarch64/pthread_arch.h
Examining data/musl-1.2.1/arch/aarch64/reloc.h
Examining data/musl-1.2.1/arch/aarch64/syscall_arch.h
Examining data/musl-1.2.1/arch/arm/atomic_arch.h
Examining data/musl-1.2.1/arch/arm/bits/fcntl.h
Examining data/musl-1.2.1/arch/arm/bits/fenv.h
Examining data/musl-1.2.1/arch/arm/bits/float.h
Examining data/musl-1.2.1/arch/arm/bits/hwcap.h
Examining data/musl-1.2.1/arch/arm/bits/ioctl_fix.h
Examining data/musl-1.2.1/arch/arm/bits/ipcstat.h
Examining data/musl-1.2.1/arch/arm/bits/msg.h
Examining data/musl-1.2.1/arch/arm/bits/posix.h
Examining data/musl-1.2.1/arch/arm/bits/ptrace.h
Examining data/musl-1.2.1/arch/arm/bits/reg.h
Examining data/musl-1.2.1/arch/arm/bits/sem.h
Examining data/musl-1.2.1/arch/arm/bits/setjmp.h
Examining data/musl-1.2.1/arch/arm/bits/shm.h
Examining data/musl-1.2.1/arch/arm/bits/signal.h
Examining data/musl-1.2.1/arch/arm/bits/stat.h
Examining data/musl-1.2.1/arch/arm/bits/stdint.h
Examining data/musl-1.2.1/arch/arm/bits/user.h
Examining data/musl-1.2.1/arch/arm/crt_arch.h
Examining data/musl-1.2.1/arch/arm/kstat.h
Examining data/musl-1.2.1/arch/arm/pthread_arch.h
Examining data/musl-1.2.1/arch/arm/reloc.h
Examining data/musl-1.2.1/arch/arm/syscall_arch.h
Examining data/musl-1.2.1/arch/generic/bits/dirent.h
Examining data/musl-1.2.1/arch/generic/bits/errno.h
Examining data/musl-1.2.1/arch/generic/bits/fcntl.h
Examining data/musl-1.2.1/arch/generic/bits/fenv.h
Examining data/musl-1.2.1/arch/generic/bits/hwcap.h
Examining data/musl-1.2.1/arch/generic/bits/io.h
Examining data/musl-1.2.1/arch/generic/bits/ioctl.h
Examining data/musl-1.2.1/arch/generic/bits/ioctl_fix.h
Examining data/musl-1.2.1/arch/generic/bits/ipc.h
Examining data/musl-1.2.1/arch/generic/bits/ipcstat.h
Examining data/musl-1.2.1/arch/generic/bits/kd.h
Examining data/musl-1.2.1/arch/generic/bits/limits.h
Examining data/musl-1.2.1/arch/generic/bits/link.h
Examining data/musl-1.2.1/arch/generic/bits/mman.h
Examining data/musl-1.2.1/arch/generic/bits/msg.h
Examining data/musl-1.2.1/arch/generic/bits/poll.h
Examining data/musl-1.2.1/arch/generic/bits/ptrace.h
Examining data/musl-1.2.1/arch/generic/bits/resource.h
Examining data/musl-1.2.1/arch/generic/bits/sem.h
Examining data/musl-1.2.1/arch/generic/bits/shm.h
Examining data/musl-1.2.1/arch/generic/bits/socket.h
Examining data/musl-1.2.1/arch/generic/bits/soundcard.h
Examining data/musl-1.2.1/arch/generic/bits/statfs.h
Examining data/musl-1.2.1/arch/generic/bits/termios.h
Examining data/musl-1.2.1/arch/generic/bits/vt.h
Examining data/musl-1.2.1/arch/generic/fp_arch.h
Examining data/musl-1.2.1/arch/i386/atomic_arch.h
Examining data/musl-1.2.1/arch/i386/bits/fenv.h
Examining data/musl-1.2.1/arch/i386/bits/float.h
Examining data/musl-1.2.1/arch/i386/bits/io.h
Examining data/musl-1.2.1/arch/i386/bits/ipcstat.h
Examining data/musl-1.2.1/arch/i386/bits/limits.h
Examining data/musl-1.2.1/arch/i386/bits/mman.h
Examining data/musl-1.2.1/arch/i386/bits/msg.h
Examining data/musl-1.2.1/arch/i386/bits/posix.h
Examining data/musl-1.2.1/arch/i386/bits/ptrace.h
Examining data/musl-1.2.1/arch/i386/bits/reg.h
Examining data/musl-1.2.1/arch/i386/bits/sem.h
Examining data/musl-1.2.1/arch/i386/bits/setjmp.h
Examining data/musl-1.2.1/arch/i386/bits/shm.h
Examining data/musl-1.2.1/arch/i386/bits/signal.h
Examining data/musl-1.2.1/arch/i386/bits/stat.h
Examining data/musl-1.2.1/arch/i386/bits/stdint.h
Examining data/musl-1.2.1/arch/i386/bits/user.h
Examining data/musl-1.2.1/arch/i386/crt_arch.h
Examining data/musl-1.2.1/arch/i386/kstat.h
Examining data/musl-1.2.1/arch/i386/pthread_arch.h
Examining data/musl-1.2.1/arch/i386/reloc.h
Examining data/musl-1.2.1/arch/i386/syscall_arch.h
Examining data/musl-1.2.1/arch/m68k/atomic_arch.h
Examining data/musl-1.2.1/arch/m68k/bits/fcntl.h
Examining data/musl-1.2.1/arch/m68k/bits/fenv.h
Examining data/musl-1.2.1/arch/m68k/bits/float.h
Examining data/musl-1.2.1/arch/m68k/bits/ipcstat.h
Examining data/musl-1.2.1/arch/m68k/bits/msg.h
Examining data/musl-1.2.1/arch/m68k/bits/posix.h
Examining data/musl-1.2.1/arch/m68k/bits/ptrace.h
Examining data/musl-1.2.1/arch/m68k/bits/reg.h
Examining data/musl-1.2.1/arch/m68k/bits/sem.h
Examining data/musl-1.2.1/arch/m68k/bits/setjmp.h
Examining data/musl-1.2.1/arch/m68k/bits/shm.h
Examining data/musl-1.2.1/arch/m68k/bits/signal.h
Examining data/musl-1.2.1/arch/m68k/bits/stat.h
Examining data/musl-1.2.1/arch/m68k/bits/stdint.h
Examining data/musl-1.2.1/arch/m68k/bits/user.h
Examining data/musl-1.2.1/arch/m68k/crt_arch.h
Examining data/musl-1.2.1/arch/m68k/kstat.h
Examining data/musl-1.2.1/arch/m68k/pthread_arch.h
Examining data/musl-1.2.1/arch/m68k/reloc.h
Examining data/musl-1.2.1/arch/m68k/syscall_arch.h
Examining data/musl-1.2.1/arch/microblaze/atomic_arch.h
Examining data/musl-1.2.1/arch/microblaze/bits/float.h
Examining data/musl-1.2.1/arch/microblaze/bits/ipcstat.h
Examining data/musl-1.2.1/arch/microblaze/bits/msg.h
Examining data/musl-1.2.1/arch/microblaze/bits/posix.h
Examining data/musl-1.2.1/arch/microblaze/bits/reg.h
Examining data/musl-1.2.1/arch/microblaze/bits/sem.h
Examining data/musl-1.2.1/arch/microblaze/bits/setjmp.h
Examining data/musl-1.2.1/arch/microblaze/bits/shm.h
Examining data/musl-1.2.1/arch/microblaze/bits/signal.h
Examining data/musl-1.2.1/arch/microblaze/bits/stat.h
Examining data/musl-1.2.1/arch/microblaze/bits/stdint.h
Examining data/musl-1.2.1/arch/microblaze/bits/user.h
Examining data/musl-1.2.1/arch/microblaze/crt_arch.h
Examining data/musl-1.2.1/arch/microblaze/kstat.h
Examining data/musl-1.2.1/arch/microblaze/pthread_arch.h
Examining data/musl-1.2.1/arch/microblaze/reloc.h
Examining data/musl-1.2.1/arch/microblaze/syscall_arch.h
Examining data/musl-1.2.1/arch/mips/atomic_arch.h
Examining data/musl-1.2.1/arch/mips/bits/errno.h
Examining data/musl-1.2.1/arch/mips/bits/fcntl.h
Examining data/musl-1.2.1/arch/mips/bits/fenv.h
Examining data/musl-1.2.1/arch/mips/bits/float.h
Examining data/musl-1.2.1/arch/mips/bits/hwcap.h
Examining data/musl-1.2.1/arch/mips/bits/ioctl.h
Examining data/musl-1.2.1/arch/mips/bits/ipcstat.h
Examining data/musl-1.2.1/arch/mips/bits/mman.h
Examining data/musl-1.2.1/arch/mips/bits/msg.h
Examining data/musl-1.2.1/arch/mips/bits/poll.h
Examining data/musl-1.2.1/arch/mips/bits/posix.h
Examining data/musl-1.2.1/arch/mips/bits/ptrace.h
Examining data/musl-1.2.1/arch/mips/bits/reg.h
Examining data/musl-1.2.1/arch/mips/bits/resource.h
Examining data/musl-1.2.1/arch/mips/bits/sem.h
Examining data/musl-1.2.1/arch/mips/bits/setjmp.h
Examining data/musl-1.2.1/arch/mips/bits/shm.h
Examining data/musl-1.2.1/arch/mips/bits/signal.h
Examining data/musl-1.2.1/arch/mips/bits/socket.h
Examining data/musl-1.2.1/arch/mips/bits/stat.h
Examining data/musl-1.2.1/arch/mips/bits/statfs.h
Examining data/musl-1.2.1/arch/mips/bits/stdint.h
Examining data/musl-1.2.1/arch/mips/bits/termios.h
Examining data/musl-1.2.1/arch/mips/bits/user.h
Examining data/musl-1.2.1/arch/mips/crt_arch.h
Examining data/musl-1.2.1/arch/mips/ksigaction.h
Examining data/musl-1.2.1/arch/mips/kstat.h
Examining data/musl-1.2.1/arch/mips/pthread_arch.h
Examining data/musl-1.2.1/arch/mips/reloc.h
Examining data/musl-1.2.1/arch/mips/syscall_arch.h
Examining data/musl-1.2.1/arch/mips64/atomic_arch.h
Examining data/musl-1.2.1/arch/mips64/bits/errno.h
Examining data/musl-1.2.1/arch/mips64/bits/fcntl.h
Examining data/musl-1.2.1/arch/mips64/bits/fenv.h
Examining data/musl-1.2.1/arch/mips64/bits/float.h
Examining data/musl-1.2.1/arch/mips64/bits/hwcap.h
Examining data/musl-1.2.1/arch/mips64/bits/ioctl.h
Examining data/musl-1.2.1/arch/mips64/bits/ipc.h
Examining data/musl-1.2.1/arch/mips64/bits/mman.h
Examining data/musl-1.2.1/arch/mips64/bits/poll.h
Examining data/musl-1.2.1/arch/mips64/bits/posix.h
Examining data/musl-1.2.1/arch/mips64/bits/ptrace.h
Examining data/musl-1.2.1/arch/mips64/bits/reg.h
Examining data/musl-1.2.1/arch/mips64/bits/resource.h
Examining data/musl-1.2.1/arch/mips64/bits/setjmp.h
Examining data/musl-1.2.1/arch/mips64/bits/signal.h
Examining data/musl-1.2.1/arch/mips64/bits/socket.h
Examining data/musl-1.2.1/arch/mips64/bits/stat.h
Examining data/musl-1.2.1/arch/mips64/bits/statfs.h
Examining data/musl-1.2.1/arch/mips64/bits/stdint.h
Examining data/musl-1.2.1/arch/mips64/bits/termios.h
Examining data/musl-1.2.1/arch/mips64/bits/user.h
Examining data/musl-1.2.1/arch/mips64/crt_arch.h
Examining data/musl-1.2.1/arch/mips64/ksigaction.h
Examining data/musl-1.2.1/arch/mips64/kstat.h
Examining data/musl-1.2.1/arch/mips64/pthread_arch.h
Examining data/musl-1.2.1/arch/mips64/reloc.h
Examining data/musl-1.2.1/arch/mips64/syscall_arch.h
Examining data/musl-1.2.1/arch/mipsn32/atomic_arch.h
Examining data/musl-1.2.1/arch/mipsn32/bits/errno.h
Examining data/musl-1.2.1/arch/mipsn32/bits/fcntl.h
Examining data/musl-1.2.1/arch/mipsn32/bits/fenv.h
Examining data/musl-1.2.1/arch/mipsn32/bits/float.h
Examining data/musl-1.2.1/arch/mipsn32/bits/hwcap.h
Examining data/musl-1.2.1/arch/mipsn32/bits/ioctl.h
Examining data/musl-1.2.1/arch/mipsn32/bits/ipcstat.h
Examining data/musl-1.2.1/arch/mipsn32/bits/mman.h
Examining data/musl-1.2.1/arch/mipsn32/bits/msg.h
Examining data/musl-1.2.1/arch/mipsn32/bits/poll.h
Examining data/musl-1.2.1/arch/mipsn32/bits/posix.h
Examining data/musl-1.2.1/arch/mipsn32/bits/ptrace.h
Examining data/musl-1.2.1/arch/mipsn32/bits/reg.h
Examining data/musl-1.2.1/arch/mipsn32/bits/resource.h
Examining data/musl-1.2.1/arch/mipsn32/bits/sem.h
Examining data/musl-1.2.1/arch/mipsn32/bits/setjmp.h
Examining data/musl-1.2.1/arch/mipsn32/bits/shm.h
Examining data/musl-1.2.1/arch/mipsn32/bits/signal.h
Examining data/musl-1.2.1/arch/mipsn32/bits/socket.h
Examining data/musl-1.2.1/arch/mipsn32/bits/stat.h
Examining data/musl-1.2.1/arch/mipsn32/bits/statfs.h
Examining data/musl-1.2.1/arch/mipsn32/bits/stdint.h
Examining data/musl-1.2.1/arch/mipsn32/bits/termios.h
Examining data/musl-1.2.1/arch/mipsn32/bits/user.h
Examining data/musl-1.2.1/arch/mipsn32/crt_arch.h
Examining data/musl-1.2.1/arch/mipsn32/ksigaction.h
Examining data/musl-1.2.1/arch/mipsn32/kstat.h
Examining data/musl-1.2.1/arch/mipsn32/pthread_arch.h
Examining data/musl-1.2.1/arch/mipsn32/reloc.h
Examining data/musl-1.2.1/arch/mipsn32/syscall_arch.h
Examining data/musl-1.2.1/arch/or1k/atomic_arch.h
Examining data/musl-1.2.1/arch/or1k/bits/float.h
Examining data/musl-1.2.1/arch/or1k/bits/ipcstat.h
Examining data/musl-1.2.1/arch/or1k/bits/limits.h
Examining data/musl-1.2.1/arch/or1k/bits/msg.h
Examining data/musl-1.2.1/arch/or1k/bits/posix.h
Examining data/musl-1.2.1/arch/or1k/bits/reg.h
Examining data/musl-1.2.1/arch/or1k/bits/sem.h
Examining data/musl-1.2.1/arch/or1k/bits/setjmp.h
Examining data/musl-1.2.1/arch/or1k/bits/shm.h
Examining data/musl-1.2.1/arch/or1k/bits/signal.h
Examining data/musl-1.2.1/arch/or1k/bits/stat.h
Examining data/musl-1.2.1/arch/or1k/bits/stdint.h
Examining data/musl-1.2.1/arch/or1k/bits/user.h
Examining data/musl-1.2.1/arch/or1k/crt_arch.h
Examining data/musl-1.2.1/arch/or1k/kstat.h
Examining data/musl-1.2.1/arch/or1k/pthread_arch.h
Examining data/musl-1.2.1/arch/or1k/reloc.h
Examining data/musl-1.2.1/arch/or1k/syscall_arch.h
Examining data/musl-1.2.1/arch/powerpc/atomic_arch.h
Examining data/musl-1.2.1/arch/powerpc/bits/errno.h
Examining data/musl-1.2.1/arch/powerpc/bits/fcntl.h
Examining data/musl-1.2.1/arch/powerpc/bits/fenv.h
Examining data/musl-1.2.1/arch/powerpc/bits/float.h
Examining data/musl-1.2.1/arch/powerpc/bits/hwcap.h
Examining data/musl-1.2.1/arch/powerpc/bits/ioctl.h
Examining data/musl-1.2.1/arch/powerpc/bits/ipc.h
Examining data/musl-1.2.1/arch/powerpc/bits/ipcstat.h
Examining data/musl-1.2.1/arch/powerpc/bits/mman.h
Examining data/musl-1.2.1/arch/powerpc/bits/msg.h
Examining data/musl-1.2.1/arch/powerpc/bits/posix.h
Examining data/musl-1.2.1/arch/powerpc/bits/ptrace.h
Examining data/musl-1.2.1/arch/powerpc/bits/reg.h
Examining data/musl-1.2.1/arch/powerpc/bits/sem.h
Examining data/musl-1.2.1/arch/powerpc/bits/setjmp.h
Examining data/musl-1.2.1/arch/powerpc/bits/shm.h
Examining data/musl-1.2.1/arch/powerpc/bits/signal.h
Examining data/musl-1.2.1/arch/powerpc/bits/socket.h
Examining data/musl-1.2.1/arch/powerpc/bits/stat.h
Examining data/musl-1.2.1/arch/powerpc/bits/stdint.h
Examining data/musl-1.2.1/arch/powerpc/bits/termios.h
Examining data/musl-1.2.1/arch/powerpc/bits/user.h
Examining data/musl-1.2.1/arch/powerpc/crt_arch.h
Examining data/musl-1.2.1/arch/powerpc/kstat.h
Examining data/musl-1.2.1/arch/powerpc/pthread_arch.h
Examining data/musl-1.2.1/arch/powerpc/reloc.h
Examining data/musl-1.2.1/arch/powerpc/syscall_arch.h
Examining data/musl-1.2.1/arch/powerpc64/atomic_arch.h
Examining data/musl-1.2.1/arch/powerpc64/bits/errno.h
Examining data/musl-1.2.1/arch/powerpc64/bits/fcntl.h
Examining data/musl-1.2.1/arch/powerpc64/bits/fenv.h
Examining data/musl-1.2.1/arch/powerpc64/bits/float.h
Examining data/musl-1.2.1/arch/powerpc64/bits/hwcap.h
Examining data/musl-1.2.1/arch/powerpc64/bits/ioctl.h
Examining data/musl-1.2.1/arch/powerpc64/bits/ipc.h
Examining data/musl-1.2.1/arch/powerpc64/bits/mman.h
Examining data/musl-1.2.1/arch/powerpc64/bits/posix.h
Examining data/musl-1.2.1/arch/powerpc64/bits/ptrace.h
Examining data/musl-1.2.1/arch/powerpc64/bits/reg.h
Examining data/musl-1.2.1/arch/powerpc64/bits/setjmp.h
Examining data/musl-1.2.1/arch/powerpc64/bits/shm.h
Examining data/musl-1.2.1/arch/powerpc64/bits/signal.h
Examining data/musl-1.2.1/arch/powerpc64/bits/socket.h
Examining data/musl-1.2.1/arch/powerpc64/bits/stat.h
Examining data/musl-1.2.1/arch/powerpc64/bits/stdint.h
Examining data/musl-1.2.1/arch/powerpc64/bits/termios.h
Examining data/musl-1.2.1/arch/powerpc64/bits/user.h
Examining data/musl-1.2.1/arch/powerpc64/crt_arch.h
Examining data/musl-1.2.1/arch/powerpc64/kstat.h
Examining data/musl-1.2.1/arch/powerpc64/pthread_arch.h
Examining data/musl-1.2.1/arch/powerpc64/reloc.h
Examining data/musl-1.2.1/arch/powerpc64/syscall_arch.h
Examining data/musl-1.2.1/arch/riscv64/atomic_arch.h
Examining data/musl-1.2.1/arch/riscv64/bits/fcntl.h
Examining data/musl-1.2.1/arch/riscv64/bits/fenv.h
Examining data/musl-1.2.1/arch/riscv64/bits/float.h
Examining data/musl-1.2.1/arch/riscv64/bits/posix.h
Examining data/musl-1.2.1/arch/riscv64/bits/reg.h
Examining data/musl-1.2.1/arch/riscv64/bits/setjmp.h
Examining data/musl-1.2.1/arch/riscv64/bits/signal.h
Examining data/musl-1.2.1/arch/riscv64/bits/stat.h
Examining data/musl-1.2.1/arch/riscv64/bits/stdint.h
Examining data/musl-1.2.1/arch/riscv64/bits/user.h
Examining data/musl-1.2.1/arch/riscv64/crt_arch.h
Examining data/musl-1.2.1/arch/riscv64/kstat.h
Examining data/musl-1.2.1/arch/riscv64/pthread_arch.h
Examining data/musl-1.2.1/arch/riscv64/reloc.h
Examining data/musl-1.2.1/arch/riscv64/syscall_arch.h
Examining data/musl-1.2.1/arch/s390x/atomic_arch.h
Examining data/musl-1.2.1/arch/s390x/bits/fcntl.h
Examining data/musl-1.2.1/arch/s390x/bits/fenv.h
Examining data/musl-1.2.1/arch/s390x/bits/float.h
Examining data/musl-1.2.1/arch/s390x/bits/hwcap.h
Examining data/musl-1.2.1/arch/s390x/bits/ioctl_fix.h
Examining data/musl-1.2.1/arch/s390x/bits/limits.h
Examining data/musl-1.2.1/arch/s390x/bits/link.h
Examining data/musl-1.2.1/arch/s390x/bits/posix.h
Examining data/musl-1.2.1/arch/s390x/bits/ptrace.h
Examining data/musl-1.2.1/arch/s390x/bits/reg.h
Examining data/musl-1.2.1/arch/s390x/bits/setjmp.h
Examining data/musl-1.2.1/arch/s390x/bits/signal.h
Examining data/musl-1.2.1/arch/s390x/bits/stat.h
Examining data/musl-1.2.1/arch/s390x/bits/statfs.h
Examining data/musl-1.2.1/arch/s390x/bits/stdint.h
Examining data/musl-1.2.1/arch/s390x/bits/user.h
Examining data/musl-1.2.1/arch/s390x/crt_arch.h
Examining data/musl-1.2.1/arch/s390x/kstat.h
Examining data/musl-1.2.1/arch/s390x/pthread_arch.h
Examining data/musl-1.2.1/arch/s390x/reloc.h
Examining data/musl-1.2.1/arch/s390x/syscall_arch.h
Examining data/musl-1.2.1/arch/sh/atomic_arch.h
Examining data/musl-1.2.1/arch/sh/bits/fenv.h
Examining data/musl-1.2.1/arch/sh/bits/float.h
Examining data/musl-1.2.1/arch/sh/bits/hwcap.h
Examining data/musl-1.2.1/arch/sh/bits/ioctl.h
Examining data/musl-1.2.1/arch/sh/bits/ipcstat.h
Examining data/musl-1.2.1/arch/sh/bits/limits.h
Examining data/musl-1.2.1/arch/sh/bits/msg.h
Examining data/musl-1.2.1/arch/sh/bits/posix.h
Examining data/musl-1.2.1/arch/sh/bits/ptrace.h
Examining data/musl-1.2.1/arch/sh/bits/sem.h
Examining data/musl-1.2.1/arch/sh/bits/setjmp.h
Examining data/musl-1.2.1/arch/sh/bits/shm.h
Examining data/musl-1.2.1/arch/sh/bits/signal.h
Examining data/musl-1.2.1/arch/sh/bits/stat.h
Examining data/musl-1.2.1/arch/sh/bits/stdint.h
Examining data/musl-1.2.1/arch/sh/bits/user.h
Examining data/musl-1.2.1/arch/sh/crt_arch.h
Examining data/musl-1.2.1/arch/sh/ksigaction.h
Examining data/musl-1.2.1/arch/sh/kstat.h
Examining data/musl-1.2.1/arch/sh/pthread_arch.h
Examining data/musl-1.2.1/arch/sh/reloc.h
Examining data/musl-1.2.1/arch/sh/syscall_arch.h
Examining data/musl-1.2.1/arch/x32/atomic_arch.h
Examining data/musl-1.2.1/arch/x32/bits/fcntl.h
Examining data/musl-1.2.1/arch/x32/bits/fenv.h
Examining data/musl-1.2.1/arch/x32/bits/float.h
Examining data/musl-1.2.1/arch/x32/bits/io.h
Examining data/musl-1.2.1/arch/x32/bits/ioctl_fix.h
Examining data/musl-1.2.1/arch/x32/bits/ipc.h
Examining data/musl-1.2.1/arch/x32/bits/limits.h
Examining data/musl-1.2.1/arch/x32/bits/mman.h
Examining data/musl-1.2.1/arch/x32/bits/msg.h
Examining data/musl-1.2.1/arch/x32/bits/posix.h
Examining data/musl-1.2.1/arch/x32/bits/ptrace.h
Examining data/musl-1.2.1/arch/x32/bits/reg.h
Examining data/musl-1.2.1/arch/x32/bits/sem.h
Examining data/musl-1.2.1/arch/x32/bits/setjmp.h
Examining data/musl-1.2.1/arch/x32/bits/shm.h
Examining data/musl-1.2.1/arch/x32/bits/signal.h
Examining data/musl-1.2.1/arch/x32/bits/socket.h
Examining data/musl-1.2.1/arch/x32/bits/stat.h
Examining data/musl-1.2.1/arch/x32/bits/statfs.h
Examining data/musl-1.2.1/arch/x32/bits/stdint.h
Examining data/musl-1.2.1/arch/x32/bits/user.h
Examining data/musl-1.2.1/arch/x32/crt_arch.h
Examining data/musl-1.2.1/arch/x32/ksigaction.h
Examining data/musl-1.2.1/arch/x32/kstat.h
Examining data/musl-1.2.1/arch/x32/pthread_arch.h
Examining data/musl-1.2.1/arch/x32/reloc.h
Examining data/musl-1.2.1/arch/x32/syscall_arch.h
Examining data/musl-1.2.1/arch/x86_64/atomic_arch.h
Examining data/musl-1.2.1/arch/x86_64/bits/fcntl.h
Examining data/musl-1.2.1/arch/x86_64/bits/fenv.h
Examining data/musl-1.2.1/arch/x86_64/bits/float.h
Examining data/musl-1.2.1/arch/x86_64/bits/io.h
Examining data/musl-1.2.1/arch/x86_64/bits/limits.h
Examining data/musl-1.2.1/arch/x86_64/bits/mman.h
Examining data/musl-1.2.1/arch/x86_64/bits/posix.h
Examining data/musl-1.2.1/arch/x86_64/bits/ptrace.h
Examining data/musl-1.2.1/arch/x86_64/bits/reg.h
Examining data/musl-1.2.1/arch/x86_64/bits/sem.h
Examining data/musl-1.2.1/arch/x86_64/bits/setjmp.h
Examining data/musl-1.2.1/arch/x86_64/bits/signal.h
Examining data/musl-1.2.1/arch/x86_64/bits/stat.h
Examining data/musl-1.2.1/arch/x86_64/bits/stdint.h
Examining data/musl-1.2.1/arch/x86_64/bits/user.h
Examining data/musl-1.2.1/arch/x86_64/crt_arch.h
Examining data/musl-1.2.1/arch/x86_64/ksigaction.h
Examining data/musl-1.2.1/arch/x86_64/kstat.h
Examining data/musl-1.2.1/arch/x86_64/pthread_arch.h
Examining data/musl-1.2.1/arch/x86_64/reloc.h
Examining data/musl-1.2.1/arch/x86_64/syscall_arch.h
Examining data/musl-1.2.1/compat/time32/__xstat.c
Examining data/musl-1.2.1/compat/time32/adjtime32.c
Examining data/musl-1.2.1/compat/time32/adjtimex_time32.c
Examining data/musl-1.2.1/compat/time32/aio_suspend_time32.c
Examining data/musl-1.2.1/compat/time32/clock_adjtime32.c
Examining data/musl-1.2.1/compat/time32/clock_getres_time32.c
Examining data/musl-1.2.1/compat/time32/clock_gettime32.c
Examining data/musl-1.2.1/compat/time32/clock_nanosleep_time32.c
Examining data/musl-1.2.1/compat/time32/clock_settime32.c
Examining data/musl-1.2.1/compat/time32/cnd_timedwait_time32.c
Examining data/musl-1.2.1/compat/time32/ctime32.c
Examining data/musl-1.2.1/compat/time32/ctime32_r.c
Examining data/musl-1.2.1/compat/time32/difftime32.c
Examining data/musl-1.2.1/compat/time32/fstat_time32.c
Examining data/musl-1.2.1/compat/time32/fstatat_time32.c
Examining data/musl-1.2.1/compat/time32/ftime32.c
Examining data/musl-1.2.1/compat/time32/futimens_time32.c
Examining data/musl-1.2.1/compat/time32/futimes_time32.c
Examining data/musl-1.2.1/compat/time32/futimesat_time32.c
Examining data/musl-1.2.1/compat/time32/getitimer_time32.c
Examining data/musl-1.2.1/compat/time32/getrusage_time32.c
Examining data/musl-1.2.1/compat/time32/gettimeofday_time32.c
Examining data/musl-1.2.1/compat/time32/gmtime32.c
Examining data/musl-1.2.1/compat/time32/gmtime32_r.c
Examining data/musl-1.2.1/compat/time32/localtime32.c
Examining data/musl-1.2.1/compat/time32/localtime32_r.c
Examining data/musl-1.2.1/compat/time32/lstat_time32.c
Examining data/musl-1.2.1/compat/time32/lutimes_time32.c
Examining data/musl-1.2.1/compat/time32/mktime32.c
Examining data/musl-1.2.1/compat/time32/mq_timedreceive_time32.c
Examining data/musl-1.2.1/compat/time32/mq_timedsend_time32.c
Examining data/musl-1.2.1/compat/time32/mtx_timedlock_time32.c
Examining data/musl-1.2.1/compat/time32/nanosleep_time32.c
Examining data/musl-1.2.1/compat/time32/ppoll_time32.c
Examining data/musl-1.2.1/compat/time32/pselect_time32.c
Examining data/musl-1.2.1/compat/time32/pthread_cond_timedwait_time32.c
Examining data/musl-1.2.1/compat/time32/pthread_mutex_timedlock_time32.c
Examining data/musl-1.2.1/compat/time32/pthread_rwlock_timedrdlock_time32.c
Examining data/musl-1.2.1/compat/time32/pthread_rwlock_timedwrlock_time32.c
Examining data/musl-1.2.1/compat/time32/pthread_timedjoin_np_time32.c
Examining data/musl-1.2.1/compat/time32/recvmmsg_time32.c
Examining data/musl-1.2.1/compat/time32/sched_rr_get_interval_time32.c
Examining data/musl-1.2.1/compat/time32/select_time32.c
Examining data/musl-1.2.1/compat/time32/sem_timedwait_time32.c
Examining data/musl-1.2.1/compat/time32/semtimedop_time32.c
Examining data/musl-1.2.1/compat/time32/setitimer_time32.c
Examining data/musl-1.2.1/compat/time32/settimeofday_time32.c
Examining data/musl-1.2.1/compat/time32/sigtimedwait_time32.c
Examining data/musl-1.2.1/compat/time32/stat_time32.c
Examining data/musl-1.2.1/compat/time32/stime32.c
Examining data/musl-1.2.1/compat/time32/thrd_sleep_time32.c
Examining data/musl-1.2.1/compat/time32/time32.c
Examining data/musl-1.2.1/compat/time32/time32.h
Examining data/musl-1.2.1/compat/time32/time32gm.c
Examining data/musl-1.2.1/compat/time32/timer_gettime32.c
Examining data/musl-1.2.1/compat/time32/timer_settime32.c
Examining data/musl-1.2.1/compat/time32/timerfd_gettime32.c
Examining data/musl-1.2.1/compat/time32/timerfd_settime32.c
Examining data/musl-1.2.1/compat/time32/timespec_get_time32.c
Examining data/musl-1.2.1/compat/time32/utime_time32.c
Examining data/musl-1.2.1/compat/time32/utimensat_time32.c
Examining data/musl-1.2.1/compat/time32/utimes_time32.c
Examining data/musl-1.2.1/compat/time32/wait3_time32.c
Examining data/musl-1.2.1/compat/time32/wait4_time32.c
Examining data/musl-1.2.1/crt/Scrt1.c
Examining data/musl-1.2.1/crt/crt1.c
Examining data/musl-1.2.1/crt/crti.c
Examining data/musl-1.2.1/crt/crtn.c
Examining data/musl-1.2.1/crt/rcrt1.c
Examining data/musl-1.2.1/include/aio.h
Examining data/musl-1.2.1/include/alloca.h
Examining data/musl-1.2.1/include/ar.h
Examining data/musl-1.2.1/include/arpa/ftp.h
Examining data/musl-1.2.1/include/arpa/inet.h
Examining data/musl-1.2.1/include/arpa/nameser.h
Examining data/musl-1.2.1/include/arpa/nameser_compat.h
Examining data/musl-1.2.1/include/arpa/telnet.h
Examining data/musl-1.2.1/include/arpa/tftp.h
Examining data/musl-1.2.1/include/assert.h
Examining data/musl-1.2.1/include/byteswap.h
Examining data/musl-1.2.1/include/complex.h
Examining data/musl-1.2.1/include/cpio.h
Examining data/musl-1.2.1/include/crypt.h
Examining data/musl-1.2.1/include/ctype.h
Examining data/musl-1.2.1/include/dirent.h
Examining data/musl-1.2.1/include/dlfcn.h
Examining data/musl-1.2.1/include/elf.h
Examining data/musl-1.2.1/include/endian.h
Examining data/musl-1.2.1/include/err.h
Examining data/musl-1.2.1/include/errno.h
Examining data/musl-1.2.1/include/fcntl.h
Examining data/musl-1.2.1/include/features.h
Examining data/musl-1.2.1/include/fenv.h
Examining data/musl-1.2.1/include/float.h
Examining data/musl-1.2.1/include/fmtmsg.h
Examining data/musl-1.2.1/include/fnmatch.h
Examining data/musl-1.2.1/include/ftw.h
Examining data/musl-1.2.1/include/getopt.h
Examining data/musl-1.2.1/include/glob.h
Examining data/musl-1.2.1/include/grp.h
Examining data/musl-1.2.1/include/iconv.h
Examining data/musl-1.2.1/include/ifaddrs.h
Examining data/musl-1.2.1/include/inttypes.h
Examining data/musl-1.2.1/include/iso646.h
Examining data/musl-1.2.1/include/langinfo.h
Examining data/musl-1.2.1/include/lastlog.h
Examining data/musl-1.2.1/include/libgen.h
Examining data/musl-1.2.1/include/libintl.h
Examining data/musl-1.2.1/include/limits.h
Examining data/musl-1.2.1/include/link.h
Examining data/musl-1.2.1/include/locale.h
Examining data/musl-1.2.1/include/malloc.h
Examining data/musl-1.2.1/include/math.h
Examining data/musl-1.2.1/include/memory.h
Examining data/musl-1.2.1/include/mntent.h
Examining data/musl-1.2.1/include/monetary.h
Examining data/musl-1.2.1/include/mqueue.h
Examining data/musl-1.2.1/include/net/ethernet.h
Examining data/musl-1.2.1/include/net/if.h
Examining data/musl-1.2.1/include/net/if_arp.h
Examining data/musl-1.2.1/include/net/route.h
Examining data/musl-1.2.1/include/netdb.h
Examining data/musl-1.2.1/include/netinet/ether.h
Examining data/musl-1.2.1/include/netinet/icmp6.h
Examining data/musl-1.2.1/include/netinet/if_ether.h
Examining data/musl-1.2.1/include/netinet/igmp.h
Examining data/musl-1.2.1/include/netinet/in.h
Examining data/musl-1.2.1/include/netinet/in_systm.h
Examining data/musl-1.2.1/include/netinet/ip.h
Examining data/musl-1.2.1/include/netinet/ip6.h
Examining data/musl-1.2.1/include/netinet/ip_icmp.h
Examining data/musl-1.2.1/include/netinet/tcp.h
Examining data/musl-1.2.1/include/netinet/udp.h
Examining data/musl-1.2.1/include/netpacket/packet.h
Examining data/musl-1.2.1/include/nl_types.h
Examining data/musl-1.2.1/include/paths.h
Examining data/musl-1.2.1/include/poll.h
Examining data/musl-1.2.1/include/pthread.h
Examining data/musl-1.2.1/include/pty.h
Examining data/musl-1.2.1/include/pwd.h
Examining data/musl-1.2.1/include/regex.h
Examining data/musl-1.2.1/include/resolv.h
Examining data/musl-1.2.1/include/sched.h
Examining data/musl-1.2.1/include/scsi/scsi.h
Examining data/musl-1.2.1/include/scsi/scsi_ioctl.h
Examining data/musl-1.2.1/include/scsi/sg.h
Examining data/musl-1.2.1/include/search.h
Examining data/musl-1.2.1/include/semaphore.h
Examining data/musl-1.2.1/include/setjmp.h
Examining data/musl-1.2.1/include/shadow.h
Examining data/musl-1.2.1/include/signal.h
Examining data/musl-1.2.1/include/spawn.h
Examining data/musl-1.2.1/include/stdalign.h
Examining data/musl-1.2.1/include/stdarg.h
Examining data/musl-1.2.1/include/stdbool.h
Examining data/musl-1.2.1/include/stdc-predef.h
Examining data/musl-1.2.1/include/stddef.h
Examining data/musl-1.2.1/include/stdint.h
Examining data/musl-1.2.1/include/stdio.h
Examining data/musl-1.2.1/include/stdio_ext.h
Examining data/musl-1.2.1/include/stdlib.h
Examining data/musl-1.2.1/include/stdnoreturn.h
Examining data/musl-1.2.1/include/string.h
Examining data/musl-1.2.1/include/strings.h
Examining data/musl-1.2.1/include/stropts.h
Examining data/musl-1.2.1/include/sys/acct.h
Examining data/musl-1.2.1/include/sys/auxv.h
Examining data/musl-1.2.1/include/sys/cachectl.h
Examining data/musl-1.2.1/include/sys/dir.h
Examining data/musl-1.2.1/include/sys/epoll.h
Examining data/musl-1.2.1/include/sys/errno.h
Examining data/musl-1.2.1/include/sys/eventfd.h
Examining data/musl-1.2.1/include/sys/fanotify.h
Examining data/musl-1.2.1/include/sys/fcntl.h
Examining data/musl-1.2.1/include/sys/file.h
Examining data/musl-1.2.1/include/sys/fsuid.h
Examining data/musl-1.2.1/include/sys/inotify.h
Examining data/musl-1.2.1/include/sys/io.h
Examining data/musl-1.2.1/include/sys/ioctl.h
Examining data/musl-1.2.1/include/sys/ipc.h
Examining data/musl-1.2.1/include/sys/kd.h
Examining data/musl-1.2.1/include/sys/klog.h
Examining data/musl-1.2.1/include/sys/membarrier.h
Examining data/musl-1.2.1/include/sys/mman.h
Examining data/musl-1.2.1/include/sys/mount.h
Examining data/musl-1.2.1/include/sys/msg.h
Examining data/musl-1.2.1/include/sys/mtio.h
Examining data/musl-1.2.1/include/sys/param.h
Examining data/musl-1.2.1/include/sys/personality.h
Examining data/musl-1.2.1/include/sys/poll.h
Examining data/musl-1.2.1/include/sys/prctl.h
Examining data/musl-1.2.1/include/sys/procfs.h
Examining data/musl-1.2.1/include/sys/ptrace.h
Examining data/musl-1.2.1/include/sys/quota.h
Examining data/musl-1.2.1/include/sys/random.h
Examining data/musl-1.2.1/include/sys/reboot.h
Examining data/musl-1.2.1/include/sys/reg.h
Examining data/musl-1.2.1/include/sys/resource.h
Examining data/musl-1.2.1/include/sys/select.h
Examining data/musl-1.2.1/include/sys/sem.h
Examining data/musl-1.2.1/include/sys/sendfile.h
Examining data/musl-1.2.1/include/sys/shm.h
Examining data/musl-1.2.1/include/sys/signal.h
Examining data/musl-1.2.1/include/sys/signalfd.h
Examining data/musl-1.2.1/include/sys/socket.h
Examining data/musl-1.2.1/include/sys/soundcard.h
Examining data/musl-1.2.1/include/sys/stat.h
Examining data/musl-1.2.1/include/sys/statfs.h
Examining data/musl-1.2.1/include/sys/statvfs.h
Examining data/musl-1.2.1/include/sys/stropts.h
Examining data/musl-1.2.1/include/sys/swap.h
Examining data/musl-1.2.1/include/sys/syscall.h
Examining data/musl-1.2.1/include/sys/sysinfo.h
Examining data/musl-1.2.1/include/sys/syslog.h
Examining data/musl-1.2.1/include/sys/sysmacros.h
Examining data/musl-1.2.1/include/sys/termios.h
Examining data/musl-1.2.1/include/sys/time.h
Examining data/musl-1.2.1/include/sys/timeb.h
Examining data/musl-1.2.1/include/sys/timerfd.h
Examining data/musl-1.2.1/include/sys/times.h
Examining data/musl-1.2.1/include/sys/timex.h
Examining data/musl-1.2.1/include/sys/ttydefaults.h
Examining data/musl-1.2.1/include/sys/types.h
Examining data/musl-1.2.1/include/sys/ucontext.h
Examining data/musl-1.2.1/include/sys/uio.h
Examining data/musl-1.2.1/include/sys/un.h
Examining data/musl-1.2.1/include/sys/user.h
Examining data/musl-1.2.1/include/sys/utsname.h
Examining data/musl-1.2.1/include/sys/vfs.h
Examining data/musl-1.2.1/include/sys/vt.h
Examining data/musl-1.2.1/include/sys/wait.h
Examining data/musl-1.2.1/include/sys/xattr.h
Examining data/musl-1.2.1/include/syscall.h
Examining data/musl-1.2.1/include/sysexits.h
Examining data/musl-1.2.1/include/syslog.h
Examining data/musl-1.2.1/include/tar.h
Examining data/musl-1.2.1/include/termios.h
Examining data/musl-1.2.1/include/tgmath.h
Examining data/musl-1.2.1/include/threads.h
Examining data/musl-1.2.1/include/time.h
Examining data/musl-1.2.1/include/uchar.h
Examining data/musl-1.2.1/include/ucontext.h
Examining data/musl-1.2.1/include/ulimit.h
Examining data/musl-1.2.1/include/unistd.h
Examining data/musl-1.2.1/include/utime.h
Examining data/musl-1.2.1/include/utmp.h
Examining data/musl-1.2.1/include/utmpx.h
Examining data/musl-1.2.1/include/values.h
Examining data/musl-1.2.1/include/wait.h
Examining data/musl-1.2.1/include/wchar.h
Examining data/musl-1.2.1/include/wctype.h
Examining data/musl-1.2.1/include/wordexp.h
Examining data/musl-1.2.1/ldso/dlstart.c
Examining data/musl-1.2.1/ldso/dynlink.c
Examining data/musl-1.2.1/src/aio/aio.c
Examining data/musl-1.2.1/src/aio/aio_suspend.c
Examining data/musl-1.2.1/src/aio/lio_listio.c
Examining data/musl-1.2.1/src/complex/__cexp.c
Examining data/musl-1.2.1/src/complex/__cexpf.c
Examining data/musl-1.2.1/src/complex/cabs.c
Examining data/musl-1.2.1/src/complex/cabsf.c
Examining data/musl-1.2.1/src/complex/cabsl.c
Examining data/musl-1.2.1/src/complex/cacos.c
Examining data/musl-1.2.1/src/complex/cacosf.c
Examining data/musl-1.2.1/src/complex/cacosh.c
Examining data/musl-1.2.1/src/complex/cacoshf.c
Examining data/musl-1.2.1/src/complex/cacoshl.c
Examining data/musl-1.2.1/src/complex/cacosl.c
Examining data/musl-1.2.1/src/complex/carg.c
Examining data/musl-1.2.1/src/complex/cargf.c
Examining data/musl-1.2.1/src/complex/cargl.c
Examining data/musl-1.2.1/src/complex/casin.c
Examining data/musl-1.2.1/src/complex/casinf.c
Examining data/musl-1.2.1/src/complex/casinh.c
Examining data/musl-1.2.1/src/complex/casinhf.c
Examining data/musl-1.2.1/src/complex/casinhl.c
Examining data/musl-1.2.1/src/complex/casinl.c
Examining data/musl-1.2.1/src/complex/catan.c
Examining data/musl-1.2.1/src/complex/catanf.c
Examining data/musl-1.2.1/src/complex/catanh.c
Examining data/musl-1.2.1/src/complex/catanhf.c
Examining data/musl-1.2.1/src/complex/catanhl.c
Examining data/musl-1.2.1/src/complex/catanl.c
Examining data/musl-1.2.1/src/complex/ccos.c
Examining data/musl-1.2.1/src/complex/ccosf.c
Examining data/musl-1.2.1/src/complex/ccosh.c
Examining data/musl-1.2.1/src/complex/ccoshf.c
Examining data/musl-1.2.1/src/complex/ccoshl.c
Examining data/musl-1.2.1/src/complex/ccosl.c
Examining data/musl-1.2.1/src/complex/cexp.c
Examining data/musl-1.2.1/src/complex/cexpf.c
Examining data/musl-1.2.1/src/complex/cexpl.c
Examining data/musl-1.2.1/src/complex/cimag.c
Examining data/musl-1.2.1/src/complex/cimagf.c
Examining data/musl-1.2.1/src/complex/cimagl.c
Examining data/musl-1.2.1/src/complex/clog.c
Examining data/musl-1.2.1/src/complex/clogf.c
Examining data/musl-1.2.1/src/complex/clogl.c
Examining data/musl-1.2.1/src/complex/conj.c
Examining data/musl-1.2.1/src/complex/conjf.c
Examining data/musl-1.2.1/src/complex/conjl.c
Examining data/musl-1.2.1/src/complex/cpow.c
Examining data/musl-1.2.1/src/complex/cpowf.c
Examining data/musl-1.2.1/src/complex/cpowl.c
Examining data/musl-1.2.1/src/complex/cproj.c
Examining data/musl-1.2.1/src/complex/cprojf.c
Examining data/musl-1.2.1/src/complex/cprojl.c
Examining data/musl-1.2.1/src/complex/creal.c
Examining data/musl-1.2.1/src/complex/crealf.c
Examining data/musl-1.2.1/src/complex/creall.c
Examining data/musl-1.2.1/src/complex/csin.c
Examining data/musl-1.2.1/src/complex/csinf.c
Examining data/musl-1.2.1/src/complex/csinh.c
Examining data/musl-1.2.1/src/complex/csinhf.c
Examining data/musl-1.2.1/src/complex/csinhl.c
Examining data/musl-1.2.1/src/complex/csinl.c
Examining data/musl-1.2.1/src/complex/csqrt.c
Examining data/musl-1.2.1/src/complex/csqrtf.c
Examining data/musl-1.2.1/src/complex/csqrtl.c
Examining data/musl-1.2.1/src/complex/ctan.c
Examining data/musl-1.2.1/src/complex/ctanf.c
Examining data/musl-1.2.1/src/complex/ctanh.c
Examining data/musl-1.2.1/src/complex/ctanhf.c
Examining data/musl-1.2.1/src/complex/ctanhl.c
Examining data/musl-1.2.1/src/complex/ctanl.c
Examining data/musl-1.2.1/src/conf/confstr.c
Examining data/musl-1.2.1/src/conf/fpathconf.c
Examining data/musl-1.2.1/src/conf/legacy.c
Examining data/musl-1.2.1/src/conf/pathconf.c
Examining data/musl-1.2.1/src/conf/sysconf.c
Examining data/musl-1.2.1/src/crypt/crypt.c
Examining data/musl-1.2.1/src/crypt/crypt_blowfish.c
Examining data/musl-1.2.1/src/crypt/crypt_des.c
Examining data/musl-1.2.1/src/crypt/crypt_des.h
Examining data/musl-1.2.1/src/crypt/crypt_md5.c
Examining data/musl-1.2.1/src/crypt/crypt_r.c
Examining data/musl-1.2.1/src/crypt/crypt_sha256.c
Examining data/musl-1.2.1/src/crypt/crypt_sha512.c
Examining data/musl-1.2.1/src/crypt/encrypt.c
Examining data/musl-1.2.1/src/ctype/__ctype_b_loc.c
Examining data/musl-1.2.1/src/ctype/__ctype_get_mb_cur_max.c
Examining data/musl-1.2.1/src/ctype/__ctype_tolower_loc.c
Examining data/musl-1.2.1/src/ctype/__ctype_toupper_loc.c
Examining data/musl-1.2.1/src/ctype/alpha.h
Examining data/musl-1.2.1/src/ctype/casemap.h
Examining data/musl-1.2.1/src/ctype/isalnum.c
Examining data/musl-1.2.1/src/ctype/isalpha.c
Examining data/musl-1.2.1/src/ctype/isascii.c
Examining data/musl-1.2.1/src/ctype/isblank.c
Examining data/musl-1.2.1/src/ctype/iscntrl.c
Examining data/musl-1.2.1/src/ctype/isdigit.c
Examining data/musl-1.2.1/src/ctype/isgraph.c
Examining data/musl-1.2.1/src/ctype/islower.c
Examining data/musl-1.2.1/src/ctype/isprint.c
Examining data/musl-1.2.1/src/ctype/ispunct.c
Examining data/musl-1.2.1/src/ctype/isspace.c
Examining data/musl-1.2.1/src/ctype/isupper.c
Examining data/musl-1.2.1/src/ctype/iswalnum.c
Examining data/musl-1.2.1/src/ctype/iswalpha.c
Examining data/musl-1.2.1/src/ctype/iswblank.c
Examining data/musl-1.2.1/src/ctype/iswcntrl.c
Examining data/musl-1.2.1/src/ctype/iswctype.c
Examining data/musl-1.2.1/src/ctype/iswdigit.c
Examining data/musl-1.2.1/src/ctype/iswgraph.c
Examining data/musl-1.2.1/src/ctype/iswlower.c
Examining data/musl-1.2.1/src/ctype/iswprint.c
Examining data/musl-1.2.1/src/ctype/iswpunct.c
Examining data/musl-1.2.1/src/ctype/iswspace.c
Examining data/musl-1.2.1/src/ctype/iswupper.c
Examining data/musl-1.2.1/src/ctype/iswxdigit.c
Examining data/musl-1.2.1/src/ctype/isxdigit.c
Examining data/musl-1.2.1/src/ctype/nonspacing.h
Examining data/musl-1.2.1/src/ctype/punct.h
Examining data/musl-1.2.1/src/ctype/toascii.c
Examining data/musl-1.2.1/src/ctype/tolower.c
Examining data/musl-1.2.1/src/ctype/toupper.c
Examining data/musl-1.2.1/src/ctype/towctrans.c
Examining data/musl-1.2.1/src/ctype/wcswidth.c
Examining data/musl-1.2.1/src/ctype/wctrans.c
Examining data/musl-1.2.1/src/ctype/wcwidth.c
Examining data/musl-1.2.1/src/ctype/wide.h
Examining data/musl-1.2.1/src/dirent/__dirent.h
Examining data/musl-1.2.1/src/dirent/alphasort.c
Examining data/musl-1.2.1/src/dirent/closedir.c
Examining data/musl-1.2.1/src/dirent/dirfd.c
Examining data/musl-1.2.1/src/dirent/fdopendir.c
Examining data/musl-1.2.1/src/dirent/opendir.c
Examining data/musl-1.2.1/src/dirent/readdir.c
Examining data/musl-1.2.1/src/dirent/readdir_r.c
Examining data/musl-1.2.1/src/dirent/rewinddir.c
Examining data/musl-1.2.1/src/dirent/scandir.c
Examining data/musl-1.2.1/src/dirent/seekdir.c
Examining data/musl-1.2.1/src/dirent/telldir.c
Examining data/musl-1.2.1/src/dirent/versionsort.c
Examining data/musl-1.2.1/src/env/__environ.c
Examining data/musl-1.2.1/src/env/__init_tls.c
Examining data/musl-1.2.1/src/env/__libc_start_main.c
Examining data/musl-1.2.1/src/env/__reset_tls.c
Examining data/musl-1.2.1/src/env/__stack_chk_fail.c
Examining data/musl-1.2.1/src/env/clearenv.c
Examining data/musl-1.2.1/src/env/getenv.c
Examining data/musl-1.2.1/src/env/putenv.c
Examining data/musl-1.2.1/src/env/secure_getenv.c
Examining data/musl-1.2.1/src/env/setenv.c
Examining data/musl-1.2.1/src/env/unsetenv.c
Examining data/musl-1.2.1/src/errno/__errno_location.c
Examining data/musl-1.2.1/src/errno/__strerror.h
Examining data/musl-1.2.1/src/errno/strerror.c
Examining data/musl-1.2.1/src/exit/_Exit.c
Examining data/musl-1.2.1/src/exit/abort.c
Examining data/musl-1.2.1/src/exit/arm/__aeabi_atexit.c
Examining data/musl-1.2.1/src/exit/assert.c
Examining data/musl-1.2.1/src/exit/at_quick_exit.c
Examining data/musl-1.2.1/src/exit/atexit.c
Examining data/musl-1.2.1/src/exit/exit.c
Examining data/musl-1.2.1/src/exit/quick_exit.c
Examining data/musl-1.2.1/src/fcntl/creat.c
Examining data/musl-1.2.1/src/fcntl/fcntl.c
Examining data/musl-1.2.1/src/fcntl/open.c
Examining data/musl-1.2.1/src/fcntl/openat.c
Examining data/musl-1.2.1/src/fcntl/posix_fadvise.c
Examining data/musl-1.2.1/src/fcntl/posix_fallocate.c
Examining data/musl-1.2.1/src/fenv/__flt_rounds.c
Examining data/musl-1.2.1/src/fenv/arm/fenv.c
Examining data/musl-1.2.1/src/fenv/fegetexceptflag.c
Examining data/musl-1.2.1/src/fenv/feholdexcept.c
Examining data/musl-1.2.1/src/fenv/fenv.c
Examining data/musl-1.2.1/src/fenv/fesetexceptflag.c
Examining data/musl-1.2.1/src/fenv/fesetround.c
Examining data/musl-1.2.1/src/fenv/feupdateenv.c
Examining data/musl-1.2.1/src/fenv/m68k/fenv.c
Examining data/musl-1.2.1/src/fenv/mips/fenv-sf.c
Examining data/musl-1.2.1/src/fenv/mips64/fenv-sf.c
Examining data/musl-1.2.1/src/fenv/mipsn32/fenv-sf.c
Examining data/musl-1.2.1/src/fenv/powerpc/fenv-sf.c
Examining data/musl-1.2.1/src/fenv/powerpc64/fenv.c
Examining data/musl-1.2.1/src/fenv/riscv64/fenv-sf.c
Examining data/musl-1.2.1/src/fenv/s390x/fenv.c
Examining data/musl-1.2.1/src/fenv/sh/fenv-nofpu.c
Examining data/musl-1.2.1/src/include/arpa/inet.h
Examining data/musl-1.2.1/src/include/crypt.h
Examining data/musl-1.2.1/src/include/errno.h
Examining data/musl-1.2.1/src/include/features.h
Examining data/musl-1.2.1/src/include/langinfo.h
Examining data/musl-1.2.1/src/include/pthread.h
Examining data/musl-1.2.1/src/include/resolv.h
Examining data/musl-1.2.1/src/include/signal.h
Examining data/musl-1.2.1/src/include/stdio.h
Examining data/musl-1.2.1/src/include/stdlib.h
Examining data/musl-1.2.1/src/include/string.h
Examining data/musl-1.2.1/src/include/sys/auxv.h
Examining data/musl-1.2.1/src/include/sys/membarrier.h
Examining data/musl-1.2.1/src/include/sys/mman.h
Examining data/musl-1.2.1/src/include/sys/sysinfo.h
Examining data/musl-1.2.1/src/include/sys/time.h
Examining data/musl-1.2.1/src/include/time.h
Examining data/musl-1.2.1/src/include/unistd.h
Examining data/musl-1.2.1/src/include/wchar.h
Examining data/musl-1.2.1/src/internal/atomic.h
Examining data/musl-1.2.1/src/internal/complex_impl.h
Examining data/musl-1.2.1/src/internal/defsysinfo.c
Examining data/musl-1.2.1/src/internal/dynlink.h
Examining data/musl-1.2.1/src/internal/fdpic_crt.h
Examining data/musl-1.2.1/src/internal/floatscan.c
Examining data/musl-1.2.1/src/internal/floatscan.h
Examining data/musl-1.2.1/src/internal/futex.h
Examining data/musl-1.2.1/src/internal/intscan.c
Examining data/musl-1.2.1/src/internal/intscan.h
Examining data/musl-1.2.1/src/internal/ksigaction.h
Examining data/musl-1.2.1/src/internal/libc.c
Examining data/musl-1.2.1/src/internal/libc.h
Examining data/musl-1.2.1/src/internal/libm.h
Examining data/musl-1.2.1/src/internal/locale_impl.h
Examining data/musl-1.2.1/src/internal/lock.h
Examining data/musl-1.2.1/src/internal/procfdname.c
Examining data/musl-1.2.1/src/internal/pthread_impl.h
Examining data/musl-1.2.1/src/internal/sh/__shcall.c
Examining data/musl-1.2.1/src/internal/shgetc.c
Examining data/musl-1.2.1/src/internal/shgetc.h
Examining data/musl-1.2.1/src/internal/stdio_impl.h
Examining data/musl-1.2.1/src/internal/syscall.h
Examining data/musl-1.2.1/src/internal/syscall_ret.c
Examining data/musl-1.2.1/src/internal/vdso.c
Examining data/musl-1.2.1/src/internal/version.c
Examining data/musl-1.2.1/src/ipc/ftok.c
Examining data/musl-1.2.1/src/ipc/ipc.h
Examining data/musl-1.2.1/src/ipc/msgctl.c
Examining data/musl-1.2.1/src/ipc/msgget.c
Examining data/musl-1.2.1/src/ipc/msgrcv.c
Examining data/musl-1.2.1/src/ipc/msgsnd.c
Examining data/musl-1.2.1/src/ipc/semctl.c
Examining data/musl-1.2.1/src/ipc/semget.c
Examining data/musl-1.2.1/src/ipc/semop.c
Examining data/musl-1.2.1/src/ipc/semtimedop.c
Examining data/musl-1.2.1/src/ipc/shmat.c
Examining data/musl-1.2.1/src/ipc/shmctl.c
Examining data/musl-1.2.1/src/ipc/shmdt.c
Examining data/musl-1.2.1/src/ipc/shmget.c
Examining data/musl-1.2.1/src/ldso/__dlsym.c
Examining data/musl-1.2.1/src/ldso/arm/find_exidx.c
Examining data/musl-1.2.1/src/ldso/dl_iterate_phdr.c
Examining data/musl-1.2.1/src/ldso/dladdr.c
Examining data/musl-1.2.1/src/ldso/dlclose.c
Examining data/musl-1.2.1/src/ldso/dlerror.c
Examining data/musl-1.2.1/src/ldso/dlinfo.c
Examining data/musl-1.2.1/src/ldso/dlopen.c
Examining data/musl-1.2.1/src/ldso/dlsym.c
Examining data/musl-1.2.1/src/ldso/tlsdesc.c
Examining data/musl-1.2.1/src/legacy/cuserid.c
Examining data/musl-1.2.1/src/legacy/daemon.c
Examining data/musl-1.2.1/src/legacy/err.c
Examining data/musl-1.2.1/src/legacy/euidaccess.c
Examining data/musl-1.2.1/src/legacy/ftw.c
Examining data/musl-1.2.1/src/legacy/futimes.c
Examining data/musl-1.2.1/src/legacy/getdtablesize.c
Examining data/musl-1.2.1/src/legacy/getloadavg.c
Examining data/musl-1.2.1/src/legacy/getpagesize.c
Examining data/musl-1.2.1/src/legacy/getpass.c
Examining data/musl-1.2.1/src/legacy/getusershell.c
Examining data/musl-1.2.1/src/legacy/isastream.c
Examining data/musl-1.2.1/src/legacy/lutimes.c
Examining data/musl-1.2.1/src/legacy/ulimit.c
Examining data/musl-1.2.1/src/legacy/utmpx.c
Examining data/musl-1.2.1/src/legacy/valloc.c
Examining data/musl-1.2.1/src/linux/adjtime.c
Examining data/musl-1.2.1/src/linux/adjtimex.c
Examining data/musl-1.2.1/src/linux/arch_prctl.c
Examining data/musl-1.2.1/src/linux/brk.c
Examining data/musl-1.2.1/src/linux/cache.c
Examining data/musl-1.2.1/src/linux/cap.c
Examining data/musl-1.2.1/src/linux/chroot.c
Examining data/musl-1.2.1/src/linux/clock_adjtime.c
Examining data/musl-1.2.1/src/linux/clone.c
Examining data/musl-1.2.1/src/linux/copy_file_range.c
Examining data/musl-1.2.1/src/linux/epoll.c
Examining data/musl-1.2.1/src/linux/eventfd.c
Examining data/musl-1.2.1/src/linux/fallocate.c
Examining data/musl-1.2.1/src/linux/fanotify.c
Examining data/musl-1.2.1/src/linux/flock.c
Examining data/musl-1.2.1/src/linux/getdents.c
Examining data/musl-1.2.1/src/linux/getrandom.c
Examining data/musl-1.2.1/src/linux/inotify.c
Examining data/musl-1.2.1/src/linux/ioperm.c
Examining data/musl-1.2.1/src/linux/iopl.c
Examining data/musl-1.2.1/src/linux/klogctl.c
Examining data/musl-1.2.1/src/linux/membarrier.c
Examining data/musl-1.2.1/src/linux/memfd_create.c
Examining data/musl-1.2.1/src/linux/mlock2.c
Examining data/musl-1.2.1/src/linux/module.c
Examining data/musl-1.2.1/src/linux/mount.c
Examining data/musl-1.2.1/src/linux/name_to_handle_at.c
Examining data/musl-1.2.1/src/linux/open_by_handle_at.c
Examining data/musl-1.2.1/src/linux/personality.c
Examining data/musl-1.2.1/src/linux/pivot_root.c
Examining data/musl-1.2.1/src/linux/ppoll.c
Examining data/musl-1.2.1/src/linux/prctl.c
Examining data/musl-1.2.1/src/linux/prlimit.c
Examining data/musl-1.2.1/src/linux/process_vm.c
Examining data/musl-1.2.1/src/linux/ptrace.c
Examining data/musl-1.2.1/src/linux/quotactl.c
Examining data/musl-1.2.1/src/linux/readahead.c
Examining data/musl-1.2.1/src/linux/reboot.c
Examining data/musl-1.2.1/src/linux/remap_file_pages.c
Examining data/musl-1.2.1/src/linux/sbrk.c
Examining data/musl-1.2.1/src/linux/sendfile.c
Examining data/musl-1.2.1/src/linux/setfsgid.c
Examining data/musl-1.2.1/src/linux/setfsuid.c
Examining data/musl-1.2.1/src/linux/setgroups.c
Examining data/musl-1.2.1/src/linux/sethostname.c
Examining data/musl-1.2.1/src/linux/setns.c
Examining data/musl-1.2.1/src/linux/settimeofday.c
Examining data/musl-1.2.1/src/linux/signalfd.c
Examining data/musl-1.2.1/src/linux/splice.c
Examining data/musl-1.2.1/src/linux/stime.c
Examining data/musl-1.2.1/src/linux/swap.c
Examining data/musl-1.2.1/src/linux/sync_file_range.c
Examining data/musl-1.2.1/src/linux/syncfs.c
Examining data/musl-1.2.1/src/linux/sysinfo.c
Examining data/musl-1.2.1/src/linux/tee.c
Examining data/musl-1.2.1/src/linux/timerfd.c
Examining data/musl-1.2.1/src/linux/unshare.c
Examining data/musl-1.2.1/src/linux/utimes.c
Examining data/musl-1.2.1/src/linux/vhangup.c
Examining data/musl-1.2.1/src/linux/vmsplice.c
Examining data/musl-1.2.1/src/linux/wait3.c
Examining data/musl-1.2.1/src/linux/wait4.c
Examining data/musl-1.2.1/src/linux/x32/sysinfo.c
Examining data/musl-1.2.1/src/linux/xattr.c
Examining data/musl-1.2.1/src/locale/__lctrans.c
Examining data/musl-1.2.1/src/locale/__mo_lookup.c
Examining data/musl-1.2.1/src/locale/big5.h
Examining data/musl-1.2.1/src/locale/bind_textdomain_codeset.c
Examining data/musl-1.2.1/src/locale/c_locale.c
Examining data/musl-1.2.1/src/locale/catclose.c
Examining data/musl-1.2.1/src/locale/catgets.c
Examining data/musl-1.2.1/src/locale/catopen.c
Examining data/musl-1.2.1/src/locale/codepages.h
Examining data/musl-1.2.1/src/locale/dcngettext.c
Examining data/musl-1.2.1/src/locale/duplocale.c
Examining data/musl-1.2.1/src/locale/freelocale.c
Examining data/musl-1.2.1/src/locale/gb18030.h
Examining data/musl-1.2.1/src/locale/hkscs.h
Examining data/musl-1.2.1/src/locale/iconv.c
Examining data/musl-1.2.1/src/locale/iconv_close.c
Examining data/musl-1.2.1/src/locale/jis0208.h
Examining data/musl-1.2.1/src/locale/ksc.h
Examining data/musl-1.2.1/src/locale/langinfo.c
Examining data/musl-1.2.1/src/locale/legacychars.h
Examining data/musl-1.2.1/src/locale/locale_map.c
Examining data/musl-1.2.1/src/locale/localeconv.c
Examining data/musl-1.2.1/src/locale/newlocale.c
Examining data/musl-1.2.1/src/locale/pleval.c
Examining data/musl-1.2.1/src/locale/pleval.h
Examining data/musl-1.2.1/src/locale/revjis.h
Examining data/musl-1.2.1/src/locale/setlocale.c
Examining data/musl-1.2.1/src/locale/strcoll.c
Examining data/musl-1.2.1/src/locale/strfmon.c
Examining data/musl-1.2.1/src/locale/strxfrm.c
Examining data/musl-1.2.1/src/locale/textdomain.c
Examining data/musl-1.2.1/src/locale/uselocale.c
Examining data/musl-1.2.1/src/locale/wcscoll.c
Examining data/musl-1.2.1/src/locale/wcsxfrm.c
Examining data/musl-1.2.1/src/malloc/calloc.c
Examining data/musl-1.2.1/src/malloc/lite_malloc.c
Examining data/musl-1.2.1/src/malloc/mallocng/aligned_alloc.c
Examining data/musl-1.2.1/src/malloc/mallocng/donate.c
Examining data/musl-1.2.1/src/malloc/mallocng/free.c
Examining data/musl-1.2.1/src/malloc/mallocng/glue.h
Examining data/musl-1.2.1/src/malloc/mallocng/malloc.c
Examining data/musl-1.2.1/src/malloc/mallocng/malloc_usable_size.c
Examining data/musl-1.2.1/src/malloc/mallocng/meta.h
Examining data/musl-1.2.1/src/malloc/mallocng/realloc.c
Examining data/musl-1.2.1/src/malloc/memalign.c
Examining data/musl-1.2.1/src/malloc/oldmalloc/aligned_alloc.c
Examining data/musl-1.2.1/src/malloc/oldmalloc/malloc.c
Examining data/musl-1.2.1/src/malloc/oldmalloc/malloc_impl.h
Examining data/musl-1.2.1/src/malloc/oldmalloc/malloc_usable_size.c
Examining data/musl-1.2.1/src/malloc/posix_memalign.c
Examining data/musl-1.2.1/src/malloc/replaced.c
Examining data/musl-1.2.1/src/math/__cos.c
Examining data/musl-1.2.1/src/math/__cosdf.c
Examining data/musl-1.2.1/src/math/__cosl.c
Examining data/musl-1.2.1/src/math/__expo2.c
Examining data/musl-1.2.1/src/math/__expo2f.c
Examining data/musl-1.2.1/src/math/__fpclassify.c
Examining data/musl-1.2.1/src/math/__fpclassifyf.c
Examining data/musl-1.2.1/src/math/__fpclassifyl.c
Examining data/musl-1.2.1/src/math/__invtrigl.c
Examining data/musl-1.2.1/src/math/__invtrigl.h
Examining data/musl-1.2.1/src/math/__math_divzero.c
Examining data/musl-1.2.1/src/math/__math_divzerof.c
Examining data/musl-1.2.1/src/math/__math_invalid.c
Examining data/musl-1.2.1/src/math/__math_invalidf.c
Examining data/musl-1.2.1/src/math/__math_oflow.c
Examining data/musl-1.2.1/src/math/__math_oflowf.c
Examining data/musl-1.2.1/src/math/__math_uflow.c
Examining data/musl-1.2.1/src/math/__math_uflowf.c
Examining data/musl-1.2.1/src/math/__math_xflow.c
Examining data/musl-1.2.1/src/math/__math_xflowf.c
Examining data/musl-1.2.1/src/math/__polevll.c
Examining data/musl-1.2.1/src/math/__rem_pio2.c
Examining data/musl-1.2.1/src/math/__rem_pio2_large.c
Examining data/musl-1.2.1/src/math/__rem_pio2f.c
Examining data/musl-1.2.1/src/math/__rem_pio2l.c
Examining data/musl-1.2.1/src/math/__signbit.c
Examining data/musl-1.2.1/src/math/__signbitf.c
Examining data/musl-1.2.1/src/math/__signbitl.c
Examining data/musl-1.2.1/src/math/__sin.c
Examining data/musl-1.2.1/src/math/__sindf.c
Examining data/musl-1.2.1/src/math/__sinl.c
Examining data/musl-1.2.1/src/math/__tan.c
Examining data/musl-1.2.1/src/math/__tandf.c
Examining data/musl-1.2.1/src/math/__tanl.c
Examining data/musl-1.2.1/src/math/aarch64/ceil.c
Examining data/musl-1.2.1/src/math/aarch64/ceilf.c
Examining data/musl-1.2.1/src/math/aarch64/fabs.c
Examining data/musl-1.2.1/src/math/aarch64/fabsf.c
Examining data/musl-1.2.1/src/math/aarch64/floor.c
Examining data/musl-1.2.1/src/math/aarch64/floorf.c
Examining data/musl-1.2.1/src/math/aarch64/fma.c
Examining data/musl-1.2.1/src/math/aarch64/fmaf.c
Examining data/musl-1.2.1/src/math/aarch64/fmax.c
Examining data/musl-1.2.1/src/math/aarch64/fmaxf.c
Examining data/musl-1.2.1/src/math/aarch64/fmin.c
Examining data/musl-1.2.1/src/math/aarch64/fminf.c
Examining data/musl-1.2.1/src/math/aarch64/llrint.c
Examining data/musl-1.2.1/src/math/aarch64/llrintf.c
Examining data/musl-1.2.1/src/math/aarch64/llround.c
Examining data/musl-1.2.1/src/math/aarch64/llroundf.c
Examining data/musl-1.2.1/src/math/aarch64/lrint.c
Examining data/musl-1.2.1/src/math/aarch64/lrintf.c
Examining data/musl-1.2.1/src/math/aarch64/lround.c
Examining data/musl-1.2.1/src/math/aarch64/lroundf.c
Examining data/musl-1.2.1/src/math/aarch64/nearbyint.c
Examining data/musl-1.2.1/src/math/aarch64/nearbyintf.c
Examining data/musl-1.2.1/src/math/aarch64/rint.c
Examining data/musl-1.2.1/src/math/aarch64/rintf.c
Examining data/musl-1.2.1/src/math/aarch64/round.c
Examining data/musl-1.2.1/src/math/aarch64/roundf.c
Examining data/musl-1.2.1/src/math/aarch64/sqrt.c
Examining data/musl-1.2.1/src/math/aarch64/sqrtf.c
Examining data/musl-1.2.1/src/math/aarch64/trunc.c
Examining data/musl-1.2.1/src/math/aarch64/truncf.c
Examining data/musl-1.2.1/src/math/acos.c
Examining data/musl-1.2.1/src/math/acosf.c
Examining data/musl-1.2.1/src/math/acosh.c
Examining data/musl-1.2.1/src/math/acoshf.c
Examining data/musl-1.2.1/src/math/acoshl.c
Examining data/musl-1.2.1/src/math/acosl.c
Examining data/musl-1.2.1/src/math/arm/fabs.c
Examining data/musl-1.2.1/src/math/arm/fabsf.c
Examining data/musl-1.2.1/src/math/arm/fma.c
Examining data/musl-1.2.1/src/math/arm/fmaf.c
Examining data/musl-1.2.1/src/math/arm/sqrt.c
Examining data/musl-1.2.1/src/math/arm/sqrtf.c
Examining data/musl-1.2.1/src/math/asin.c
Examining data/musl-1.2.1/src/math/asinf.c
Examining data/musl-1.2.1/src/math/asinh.c
Examining data/musl-1.2.1/src/math/asinhf.c
Examining data/musl-1.2.1/src/math/asinhl.c
Examining data/musl-1.2.1/src/math/asinl.c
Examining data/musl-1.2.1/src/math/atan.c
Examining data/musl-1.2.1/src/math/atan2.c
Examining data/musl-1.2.1/src/math/atan2f.c
Examining data/musl-1.2.1/src/math/atan2l.c
Examining data/musl-1.2.1/src/math/atanf.c
Examining data/musl-1.2.1/src/math/atanh.c
Examining data/musl-1.2.1/src/math/atanhf.c
Examining data/musl-1.2.1/src/math/atanhl.c
Examining data/musl-1.2.1/src/math/atanl.c
Examining data/musl-1.2.1/src/math/cbrt.c
Examining data/musl-1.2.1/src/math/cbrtf.c
Examining data/musl-1.2.1/src/math/cbrtl.c
Examining data/musl-1.2.1/src/math/ceil.c
Examining data/musl-1.2.1/src/math/ceilf.c
Examining data/musl-1.2.1/src/math/ceill.c
Examining data/musl-1.2.1/src/math/copysign.c
Examining data/musl-1.2.1/src/math/copysignf.c
Examining data/musl-1.2.1/src/math/copysignl.c
Examining data/musl-1.2.1/src/math/cos.c
Examining data/musl-1.2.1/src/math/cosf.c
Examining data/musl-1.2.1/src/math/cosh.c
Examining data/musl-1.2.1/src/math/coshf.c
Examining data/musl-1.2.1/src/math/coshl.c
Examining data/musl-1.2.1/src/math/cosl.c
Examining data/musl-1.2.1/src/math/erf.c
Examining data/musl-1.2.1/src/math/erff.c
Examining data/musl-1.2.1/src/math/erfl.c
Examining data/musl-1.2.1/src/math/exp.c
Examining data/musl-1.2.1/src/math/exp10.c
Examining data/musl-1.2.1/src/math/exp10f.c
Examining data/musl-1.2.1/src/math/exp10l.c
Examining data/musl-1.2.1/src/math/exp2.c
Examining data/musl-1.2.1/src/math/exp2f.c
Examining data/musl-1.2.1/src/math/exp2f_data.c
Examining data/musl-1.2.1/src/math/exp2f_data.h
Examining data/musl-1.2.1/src/math/exp2l.c
Examining data/musl-1.2.1/src/math/exp_data.c
Examining data/musl-1.2.1/src/math/exp_data.h
Examining data/musl-1.2.1/src/math/expf.c
Examining data/musl-1.2.1/src/math/expl.c
Examining data/musl-1.2.1/src/math/expm1.c
Examining data/musl-1.2.1/src/math/expm1f.c
Examining data/musl-1.2.1/src/math/expm1l.c
Examining data/musl-1.2.1/src/math/fabs.c
Examining data/musl-1.2.1/src/math/fabsf.c
Examining data/musl-1.2.1/src/math/fabsl.c
Examining data/musl-1.2.1/src/math/fdim.c
Examining data/musl-1.2.1/src/math/fdimf.c
Examining data/musl-1.2.1/src/math/fdiml.c
Examining data/musl-1.2.1/src/math/finite.c
Examining data/musl-1.2.1/src/math/finitef.c
Examining data/musl-1.2.1/src/math/floor.c
Examining data/musl-1.2.1/src/math/floorf.c
Examining data/musl-1.2.1/src/math/floorl.c
Examining data/musl-1.2.1/src/math/fma.c
Examining data/musl-1.2.1/src/math/fmaf.c
Examining data/musl-1.2.1/src/math/fmal.c
Examining data/musl-1.2.1/src/math/fmax.c
Examining data/musl-1.2.1/src/math/fmaxf.c
Examining data/musl-1.2.1/src/math/fmaxl.c
Examining data/musl-1.2.1/src/math/fmin.c
Examining data/musl-1.2.1/src/math/fminf.c
Examining data/musl-1.2.1/src/math/fminl.c
Examining data/musl-1.2.1/src/math/fmod.c
Examining data/musl-1.2.1/src/math/fmodf.c
Examining data/musl-1.2.1/src/math/fmodl.c
Examining data/musl-1.2.1/src/math/frexp.c
Examining data/musl-1.2.1/src/math/frexpf.c
Examining data/musl-1.2.1/src/math/frexpl.c
Examining data/musl-1.2.1/src/math/hypot.c
Examining data/musl-1.2.1/src/math/hypotf.c
Examining data/musl-1.2.1/src/math/hypotl.c
Examining data/musl-1.2.1/src/math/i386/fabs.c
Examining data/musl-1.2.1/src/math/i386/fabsf.c
Examining data/musl-1.2.1/src/math/i386/fabsl.c
Examining data/musl-1.2.1/src/math/i386/fmod.c
Examining data/musl-1.2.1/src/math/i386/fmodf.c
Examining data/musl-1.2.1/src/math/i386/fmodl.c
Examining data/musl-1.2.1/src/math/i386/llrint.c
Examining data/musl-1.2.1/src/math/i386/llrintf.c
Examining data/musl-1.2.1/src/math/i386/llrintl.c
Examining data/musl-1.2.1/src/math/i386/lrint.c
Examining data/musl-1.2.1/src/math/i386/lrintf.c
Examining data/musl-1.2.1/src/math/i386/lrintl.c
Examining data/musl-1.2.1/src/math/i386/remainder.c
Examining data/musl-1.2.1/src/math/i386/remainderf.c
Examining data/musl-1.2.1/src/math/i386/remainderl.c
Examining data/musl-1.2.1/src/math/i386/rint.c
Examining data/musl-1.2.1/src/math/i386/rintf.c
Examining data/musl-1.2.1/src/math/i386/rintl.c
Examining data/musl-1.2.1/src/math/i386/sqrt.c
Examining data/musl-1.2.1/src/math/i386/sqrtf.c
Examining data/musl-1.2.1/src/math/i386/sqrtl.c
Examining data/musl-1.2.1/src/math/ilogb.c
Examining data/musl-1.2.1/src/math/ilogbf.c
Examining data/musl-1.2.1/src/math/ilogbl.c
Examining data/musl-1.2.1/src/math/j0.c
Examining data/musl-1.2.1/src/math/j0f.c
Examining data/musl-1.2.1/src/math/j1.c
Examining data/musl-1.2.1/src/math/j1f.c
Examining data/musl-1.2.1/src/math/jn.c
Examining data/musl-1.2.1/src/math/jnf.c
Examining data/musl-1.2.1/src/math/ldexp.c
Examining data/musl-1.2.1/src/math/ldexpf.c
Examining data/musl-1.2.1/src/math/ldexpl.c
Examining data/musl-1.2.1/src/math/lgamma.c
Examining data/musl-1.2.1/src/math/lgamma_r.c
Examining data/musl-1.2.1/src/math/lgammaf.c
Examining data/musl-1.2.1/src/math/lgammaf_r.c
Examining data/musl-1.2.1/src/math/lgammal.c
Examining data/musl-1.2.1/src/math/llrint.c
Examining data/musl-1.2.1/src/math/llrintf.c
Examining data/musl-1.2.1/src/math/llrintl.c
Examining data/musl-1.2.1/src/math/llround.c
Examining data/musl-1.2.1/src/math/llroundf.c
Examining data/musl-1.2.1/src/math/llroundl.c
Examining data/musl-1.2.1/src/math/log.c
Examining data/musl-1.2.1/src/math/log10.c
Examining data/musl-1.2.1/src/math/log10f.c
Examining data/musl-1.2.1/src/math/log10l.c
Examining data/musl-1.2.1/src/math/log1p.c
Examining data/musl-1.2.1/src/math/log1pf.c
Examining data/musl-1.2.1/src/math/log1pl.c
Examining data/musl-1.2.1/src/math/log2.c
Examining data/musl-1.2.1/src/math/log2_data.c
Examining data/musl-1.2.1/src/math/log2_data.h
Examining data/musl-1.2.1/src/math/log2f.c
Examining data/musl-1.2.1/src/math/log2f_data.c
Examining data/musl-1.2.1/src/math/log2f_data.h
Examining data/musl-1.2.1/src/math/log2l.c
Examining data/musl-1.2.1/src/math/log_data.c
Examining data/musl-1.2.1/src/math/log_data.h
Examining data/musl-1.2.1/src/math/logb.c
Examining data/musl-1.2.1/src/math/logbf.c
Examining data/musl-1.2.1/src/math/logbl.c
Examining data/musl-1.2.1/src/math/logf.c
Examining data/musl-1.2.1/src/math/logf_data.c
Examining data/musl-1.2.1/src/math/logf_data.h
Examining data/musl-1.2.1/src/math/logl.c
Examining data/musl-1.2.1/src/math/lrint.c
Examining data/musl-1.2.1/src/math/lrintf.c
Examining data/musl-1.2.1/src/math/lrintl.c
Examining data/musl-1.2.1/src/math/lround.c
Examining data/musl-1.2.1/src/math/lroundf.c
Examining data/musl-1.2.1/src/math/lroundl.c
Examining data/musl-1.2.1/src/math/m68k/sqrtl.c
Examining data/musl-1.2.1/src/math/mips/fabs.c
Examining data/musl-1.2.1/src/math/mips/fabsf.c
Examining data/musl-1.2.1/src/math/mips/sqrt.c
Examining data/musl-1.2.1/src/math/mips/sqrtf.c
Examining data/musl-1.2.1/src/math/modf.c
Examining data/musl-1.2.1/src/math/modff.c
Examining data/musl-1.2.1/src/math/modfl.c
Examining data/musl-1.2.1/src/math/nan.c
Examining data/musl-1.2.1/src/math/nanf.c
Examining data/musl-1.2.1/src/math/nanl.c
Examining data/musl-1.2.1/src/math/nearbyint.c
Examining data/musl-1.2.1/src/math/nearbyintf.c
Examining data/musl-1.2.1/src/math/nearbyintl.c
Examining data/musl-1.2.1/src/math/nextafter.c
Examining data/musl-1.2.1/src/math/nextafterf.c
Examining data/musl-1.2.1/src/math/nextafterl.c
Examining data/musl-1.2.1/src/math/nexttoward.c
Examining data/musl-1.2.1/src/math/nexttowardf.c
Examining data/musl-1.2.1/src/math/nexttowardl.c
Examining data/musl-1.2.1/src/math/pow.c
Examining data/musl-1.2.1/src/math/pow_data.c
Examining data/musl-1.2.1/src/math/pow_data.h
Examining data/musl-1.2.1/src/math/powerpc/fabs.c
Examining data/musl-1.2.1/src/math/powerpc/fabsf.c
Examining data/musl-1.2.1/src/math/powerpc/fma.c
Examining data/musl-1.2.1/src/math/powerpc/fmaf.c
Examining data/musl-1.2.1/src/math/powerpc/sqrt.c
Examining data/musl-1.2.1/src/math/powerpc/sqrtf.c
Examining data/musl-1.2.1/src/math/powerpc64/ceil.c
Examining data/musl-1.2.1/src/math/powerpc64/ceilf.c
Examining data/musl-1.2.1/src/math/powerpc64/fabs.c
Examining data/musl-1.2.1/src/math/powerpc64/fabsf.c
Examining data/musl-1.2.1/src/math/powerpc64/floor.c
Examining data/musl-1.2.1/src/math/powerpc64/floorf.c
Examining data/musl-1.2.1/src/math/powerpc64/fma.c
Examining data/musl-1.2.1/src/math/powerpc64/fmaf.c
Examining data/musl-1.2.1/src/math/powerpc64/fmax.c
Examining data/musl-1.2.1/src/math/powerpc64/fmaxf.c
Examining data/musl-1.2.1/src/math/powerpc64/fmin.c
Examining data/musl-1.2.1/src/math/powerpc64/fminf.c
Examining data/musl-1.2.1/src/math/powerpc64/lrint.c
Examining data/musl-1.2.1/src/math/powerpc64/lrintf.c
Examining data/musl-1.2.1/src/math/powerpc64/lround.c
Examining data/musl-1.2.1/src/math/powerpc64/lroundf.c
Examining data/musl-1.2.1/src/math/powerpc64/round.c
Examining data/musl-1.2.1/src/math/powerpc64/roundf.c
Examining data/musl-1.2.1/src/math/powerpc64/sqrt.c
Examining data/musl-1.2.1/src/math/powerpc64/sqrtf.c
Examining data/musl-1.2.1/src/math/powerpc64/trunc.c
Examining data/musl-1.2.1/src/math/powerpc64/truncf.c
Examining data/musl-1.2.1/src/math/powf.c
Examining data/musl-1.2.1/src/math/powf_data.c
Examining data/musl-1.2.1/src/math/powf_data.h
Examining data/musl-1.2.1/src/math/powl.c
Examining data/musl-1.2.1/src/math/remainder.c
Examining data/musl-1.2.1/src/math/remainderf.c
Examining data/musl-1.2.1/src/math/remainderl.c
Examining data/musl-1.2.1/src/math/remquo.c
Examining data/musl-1.2.1/src/math/remquof.c
Examining data/musl-1.2.1/src/math/remquol.c
Examining data/musl-1.2.1/src/math/rint.c
Examining data/musl-1.2.1/src/math/rintf.c
Examining data/musl-1.2.1/src/math/rintl.c
Examining data/musl-1.2.1/src/math/riscv64/copysign.c
Examining data/musl-1.2.1/src/math/riscv64/copysignf.c
Examining data/musl-1.2.1/src/math/riscv64/fabs.c
Examining data/musl-1.2.1/src/math/riscv64/fabsf.c
Examining data/musl-1.2.1/src/math/riscv64/fma.c
Examining data/musl-1.2.1/src/math/riscv64/fmaf.c
Examining data/musl-1.2.1/src/math/riscv64/fmax.c
Examining data/musl-1.2.1/src/math/riscv64/fmaxf.c
Examining data/musl-1.2.1/src/math/riscv64/fmin.c
Examining data/musl-1.2.1/src/math/riscv64/fminf.c
Examining data/musl-1.2.1/src/math/riscv64/sqrt.c
Examining data/musl-1.2.1/src/math/riscv64/sqrtf.c
Examining data/musl-1.2.1/src/math/round.c
Examining data/musl-1.2.1/src/math/roundf.c
Examining data/musl-1.2.1/src/math/roundl.c
Examining data/musl-1.2.1/src/math/s390x/ceil.c
Examining data/musl-1.2.1/src/math/s390x/ceilf.c
Examining data/musl-1.2.1/src/math/s390x/ceill.c
Examining data/musl-1.2.1/src/math/s390x/fabs.c
Examining data/musl-1.2.1/src/math/s390x/fabsf.c
Examining data/musl-1.2.1/src/math/s390x/fabsl.c
Examining data/musl-1.2.1/src/math/s390x/floor.c
Examining data/musl-1.2.1/src/math/s390x/floorf.c
Examining data/musl-1.2.1/src/math/s390x/floorl.c
Examining data/musl-1.2.1/src/math/s390x/fma.c
Examining data/musl-1.2.1/src/math/s390x/fmaf.c
Examining data/musl-1.2.1/src/math/s390x/nearbyint.c
Examining data/musl-1.2.1/src/math/s390x/nearbyintf.c
Examining data/musl-1.2.1/src/math/s390x/nearbyintl.c
Examining data/musl-1.2.1/src/math/s390x/rint.c
Examining data/musl-1.2.1/src/math/s390x/rintf.c
Examining data/musl-1.2.1/src/math/s390x/rintl.c
Examining data/musl-1.2.1/src/math/s390x/round.c
Examining data/musl-1.2.1/src/math/s390x/roundf.c
Examining data/musl-1.2.1/src/math/s390x/roundl.c
Examining data/musl-1.2.1/src/math/s390x/sqrt.c
Examining data/musl-1.2.1/src/math/s390x/sqrtf.c
Examining data/musl-1.2.1/src/math/s390x/sqrtl.c
Examining data/musl-1.2.1/src/math/s390x/trunc.c
Examining data/musl-1.2.1/src/math/s390x/truncf.c
Examining data/musl-1.2.1/src/math/s390x/truncl.c
Examining data/musl-1.2.1/src/math/scalb.c
Examining data/musl-1.2.1/src/math/scalbf.c
Examining data/musl-1.2.1/src/math/scalbln.c
Examining data/musl-1.2.1/src/math/scalblnf.c
Examining data/musl-1.2.1/src/math/scalblnl.c
Examining data/musl-1.2.1/src/math/scalbn.c
Examining data/musl-1.2.1/src/math/scalbnf.c
Examining data/musl-1.2.1/src/math/scalbnl.c
Examining data/musl-1.2.1/src/math/signgam.c
Examining data/musl-1.2.1/src/math/significand.c
Examining data/musl-1.2.1/src/math/significandf.c
Examining data/musl-1.2.1/src/math/sin.c
Examining data/musl-1.2.1/src/math/sincos.c
Examining data/musl-1.2.1/src/math/sincosf.c
Examining data/musl-1.2.1/src/math/sincosl.c
Examining data/musl-1.2.1/src/math/sinf.c
Examining data/musl-1.2.1/src/math/sinh.c
Examining data/musl-1.2.1/src/math/sinhf.c
Examining data/musl-1.2.1/src/math/sinhl.c
Examining data/musl-1.2.1/src/math/sinl.c
Examining data/musl-1.2.1/src/math/sqrt.c
Examining data/musl-1.2.1/src/math/sqrtf.c
Examining data/musl-1.2.1/src/math/sqrtl.c
Examining data/musl-1.2.1/src/math/tan.c
Examining data/musl-1.2.1/src/math/tanf.c
Examining data/musl-1.2.1/src/math/tanh.c
Examining data/musl-1.2.1/src/math/tanhf.c
Examining data/musl-1.2.1/src/math/tanhl.c
Examining data/musl-1.2.1/src/math/tanl.c
Examining data/musl-1.2.1/src/math/tgamma.c
Examining data/musl-1.2.1/src/math/tgammaf.c
Examining data/musl-1.2.1/src/math/tgammal.c
Examining data/musl-1.2.1/src/math/trunc.c
Examining data/musl-1.2.1/src/math/truncf.c
Examining data/musl-1.2.1/src/math/truncl.c
Examining data/musl-1.2.1/src/math/x32/fma.c
Examining data/musl-1.2.1/src/math/x32/fmaf.c
Examining data/musl-1.2.1/src/math/x86_64/fabs.c
Examining data/musl-1.2.1/src/math/x86_64/fabsf.c
Examining data/musl-1.2.1/src/math/x86_64/fabsl.c
Examining data/musl-1.2.1/src/math/x86_64/fma.c
Examining data/musl-1.2.1/src/math/x86_64/fmaf.c
Examining data/musl-1.2.1/src/math/x86_64/fmodl.c
Examining data/musl-1.2.1/src/math/x86_64/llrint.c
Examining data/musl-1.2.1/src/math/x86_64/llrintf.c
Examining data/musl-1.2.1/src/math/x86_64/llrintl.c
Examining data/musl-1.2.1/src/math/x86_64/lrint.c
Examining data/musl-1.2.1/src/math/x86_64/lrintf.c
Examining data/musl-1.2.1/src/math/x86_64/lrintl.c
Examining data/musl-1.2.1/src/math/x86_64/remainderl.c
Examining data/musl-1.2.1/src/math/x86_64/remquol.c
Examining data/musl-1.2.1/src/math/x86_64/rintl.c
Examining data/musl-1.2.1/src/math/x86_64/sqrt.c
Examining data/musl-1.2.1/src/math/x86_64/sqrtf.c
Examining data/musl-1.2.1/src/math/x86_64/sqrtl.c
Examining data/musl-1.2.1/src/misc/a64l.c
Examining data/musl-1.2.1/src/misc/basename.c
Examining data/musl-1.2.1/src/misc/dirname.c
Examining data/musl-1.2.1/src/misc/ffs.c
Examining data/musl-1.2.1/src/misc/ffsl.c
Examining data/musl-1.2.1/src/misc/ffsll.c
Examining data/musl-1.2.1/src/misc/fmtmsg.c
Examining data/musl-1.2.1/src/misc/forkpty.c
Examining data/musl-1.2.1/src/misc/get_current_dir_name.c
Examining data/musl-1.2.1/src/misc/getauxval.c
Examining data/musl-1.2.1/src/misc/getdomainname.c
Examining data/musl-1.2.1/src/misc/getentropy.c
Examining data/musl-1.2.1/src/misc/gethostid.c
Examining data/musl-1.2.1/src/misc/getopt.c
Examining data/musl-1.2.1/src/misc/getopt_long.c
Examining data/musl-1.2.1/src/misc/getpriority.c
Examining data/musl-1.2.1/src/misc/getresgid.c
Examining data/musl-1.2.1/src/misc/getresuid.c
Examining data/musl-1.2.1/src/misc/getrlimit.c
Examining data/musl-1.2.1/src/misc/getrusage.c
Examining data/musl-1.2.1/src/misc/getsubopt.c
Examining data/musl-1.2.1/src/misc/initgroups.c
Examining data/musl-1.2.1/src/misc/ioctl.c
Examining data/musl-1.2.1/src/misc/issetugid.c
Examining data/musl-1.2.1/src/misc/lockf.c
Examining data/musl-1.2.1/src/misc/login_tty.c
Examining data/musl-1.2.1/src/misc/mntent.c
Examining data/musl-1.2.1/src/misc/nftw.c
Examining data/musl-1.2.1/src/misc/openpty.c
Examining data/musl-1.2.1/src/misc/ptsname.c
Examining data/musl-1.2.1/src/misc/pty.c
Examining data/musl-1.2.1/src/misc/realpath.c
Examining data/musl-1.2.1/src/misc/setdomainname.c
Examining data/musl-1.2.1/src/misc/setpriority.c
Examining data/musl-1.2.1/src/misc/setrlimit.c
Examining data/musl-1.2.1/src/misc/syscall.c
Examining data/musl-1.2.1/src/misc/syslog.c
Examining data/musl-1.2.1/src/misc/uname.c
Examining data/musl-1.2.1/src/misc/wordexp.c
Examining data/musl-1.2.1/src/mman/madvise.c
Examining data/musl-1.2.1/src/mman/mincore.c
Examining data/musl-1.2.1/src/mman/mlock.c
Examining data/musl-1.2.1/src/mman/mlockall.c
Examining data/musl-1.2.1/src/mman/mmap.c
Examining data/musl-1.2.1/src/mman/mprotect.c
Examining data/musl-1.2.1/src/mman/mremap.c
Examining data/musl-1.2.1/src/mman/msync.c
Examining data/musl-1.2.1/src/mman/munlock.c
Examining data/musl-1.2.1/src/mman/munlockall.c
Examining data/musl-1.2.1/src/mman/munmap.c
Examining data/musl-1.2.1/src/mman/posix_madvise.c
Examining data/musl-1.2.1/src/mman/shm_open.c
Examining data/musl-1.2.1/src/mq/mq_close.c
Examining data/musl-1.2.1/src/mq/mq_getattr.c
Examining data/musl-1.2.1/src/mq/mq_notify.c
Examining data/musl-1.2.1/src/mq/mq_open.c
Examining data/musl-1.2.1/src/mq/mq_receive.c
Examining data/musl-1.2.1/src/mq/mq_send.c
Examining data/musl-1.2.1/src/mq/mq_setattr.c
Examining data/musl-1.2.1/src/mq/mq_timedreceive.c
Examining data/musl-1.2.1/src/mq/mq_timedsend.c
Examining data/musl-1.2.1/src/mq/mq_unlink.c
Examining data/musl-1.2.1/src/multibyte/btowc.c
Examining data/musl-1.2.1/src/multibyte/c16rtomb.c
Examining data/musl-1.2.1/src/multibyte/c32rtomb.c
Examining data/musl-1.2.1/src/multibyte/internal.c
Examining data/musl-1.2.1/src/multibyte/internal.h
Examining data/musl-1.2.1/src/multibyte/mblen.c
Examining data/musl-1.2.1/src/multibyte/mbrlen.c
Examining data/musl-1.2.1/src/multibyte/mbrtoc16.c
Examining data/musl-1.2.1/src/multibyte/mbrtoc32.c
Examining data/musl-1.2.1/src/multibyte/mbrtowc.c
Examining data/musl-1.2.1/src/multibyte/mbsinit.c
Examining data/musl-1.2.1/src/multibyte/mbsnrtowcs.c
Examining data/musl-1.2.1/src/multibyte/mbsrtowcs.c
Examining data/musl-1.2.1/src/multibyte/mbstowcs.c
Examining data/musl-1.2.1/src/multibyte/mbtowc.c
Examining data/musl-1.2.1/src/multibyte/wcrtomb.c
Examining data/musl-1.2.1/src/multibyte/wcsnrtombs.c
Examining data/musl-1.2.1/src/multibyte/wcsrtombs.c
Examining data/musl-1.2.1/src/multibyte/wcstombs.c
Examining data/musl-1.2.1/src/multibyte/wctob.c
Examining data/musl-1.2.1/src/multibyte/wctomb.c
Examining data/musl-1.2.1/src/network/accept.c
Examining data/musl-1.2.1/src/network/accept4.c
Examining data/musl-1.2.1/src/network/bind.c
Examining data/musl-1.2.1/src/network/connect.c
Examining data/musl-1.2.1/src/network/dn_comp.c
Examining data/musl-1.2.1/src/network/dn_expand.c
Examining data/musl-1.2.1/src/network/dn_skipname.c
Examining data/musl-1.2.1/src/network/dns_parse.c
Examining data/musl-1.2.1/src/network/ent.c
Examining data/musl-1.2.1/src/network/ether.c
Examining data/musl-1.2.1/src/network/freeaddrinfo.c
Examining data/musl-1.2.1/src/network/gai_strerror.c
Examining data/musl-1.2.1/src/network/getaddrinfo.c
Examining data/musl-1.2.1/src/network/gethostbyaddr.c
Examining data/musl-1.2.1/src/network/gethostbyaddr_r.c
Examining data/musl-1.2.1/src/network/gethostbyname.c
Examining data/musl-1.2.1/src/network/gethostbyname2.c
Examining data/musl-1.2.1/src/network/gethostbyname2_r.c
Examining data/musl-1.2.1/src/network/gethostbyname_r.c
Examining data/musl-1.2.1/src/network/getifaddrs.c
Examining data/musl-1.2.1/src/network/getnameinfo.c
Examining data/musl-1.2.1/src/network/getpeername.c
Examining data/musl-1.2.1/src/network/getservbyname.c
Examining data/musl-1.2.1/src/network/getservbyname_r.c
Examining data/musl-1.2.1/src/network/getservbyport.c
Examining data/musl-1.2.1/src/network/getservbyport_r.c
Examining data/musl-1.2.1/src/network/getsockname.c
Examining data/musl-1.2.1/src/network/getsockopt.c
Examining data/musl-1.2.1/src/network/h_errno.c
Examining data/musl-1.2.1/src/network/herror.c
Examining data/musl-1.2.1/src/network/hstrerror.c
Examining data/musl-1.2.1/src/network/htonl.c
Examining data/musl-1.2.1/src/network/htons.c
Examining data/musl-1.2.1/src/network/if_freenameindex.c
Examining data/musl-1.2.1/src/network/if_indextoname.c
Examining data/musl-1.2.1/src/network/if_nameindex.c
Examining data/musl-1.2.1/src/network/if_nametoindex.c
Examining data/musl-1.2.1/src/network/in6addr_any.c
Examining data/musl-1.2.1/src/network/in6addr_loopback.c
Examining data/musl-1.2.1/src/network/inet_addr.c
Examining data/musl-1.2.1/src/network/inet_aton.c
Examining data/musl-1.2.1/src/network/inet_legacy.c
Examining data/musl-1.2.1/src/network/inet_ntoa.c
Examining data/musl-1.2.1/src/network/inet_ntop.c
Examining data/musl-1.2.1/src/network/inet_pton.c
Examining data/musl-1.2.1/src/network/listen.c
Examining data/musl-1.2.1/src/network/lookup.h
Examining data/musl-1.2.1/src/network/lookup_ipliteral.c
Examining data/musl-1.2.1/src/network/lookup_name.c
Examining data/musl-1.2.1/src/network/lookup_serv.c
Examining data/musl-1.2.1/src/network/netlink.c
Examining data/musl-1.2.1/src/network/netlink.h
Examining data/musl-1.2.1/src/network/netname.c
Examining data/musl-1.2.1/src/network/ns_parse.c
Examining data/musl-1.2.1/src/network/ntohl.c
Examining data/musl-1.2.1/src/network/ntohs.c
Examining data/musl-1.2.1/src/network/proto.c
Examining data/musl-1.2.1/src/network/recv.c
Examining data/musl-1.2.1/src/network/recvfrom.c
Examining data/musl-1.2.1/src/network/recvmmsg.c
Examining data/musl-1.2.1/src/network/recvmsg.c
Examining data/musl-1.2.1/src/network/res_init.c
Examining data/musl-1.2.1/src/network/res_mkquery.c
Examining data/musl-1.2.1/src/network/res_msend.c
Examining data/musl-1.2.1/src/network/res_query.c
Examining data/musl-1.2.1/src/network/res_querydomain.c
Examining data/musl-1.2.1/src/network/res_send.c
Examining data/musl-1.2.1/src/network/res_state.c
Examining data/musl-1.2.1/src/network/resolvconf.c
Examining data/musl-1.2.1/src/network/send.c
Examining data/musl-1.2.1/src/network/sendmmsg.c
Examining data/musl-1.2.1/src/network/sendmsg.c
Examining data/musl-1.2.1/src/network/sendto.c
Examining data/musl-1.2.1/src/network/serv.c
Examining data/musl-1.2.1/src/network/setsockopt.c
Examining data/musl-1.2.1/src/network/shutdown.c
Examining data/musl-1.2.1/src/network/sockatmark.c
Examining data/musl-1.2.1/src/network/socket.c
Examining data/musl-1.2.1/src/network/socketpair.c
Examining data/musl-1.2.1/src/passwd/fgetgrent.c
Examining data/musl-1.2.1/src/passwd/fgetpwent.c
Examining data/musl-1.2.1/src/passwd/fgetspent.c
Examining data/musl-1.2.1/src/passwd/getgr_a.c
Examining data/musl-1.2.1/src/passwd/getgr_r.c
Examining data/musl-1.2.1/src/passwd/getgrent.c
Examining data/musl-1.2.1/src/passwd/getgrent_a.c
Examining data/musl-1.2.1/src/passwd/getgrouplist.c
Examining data/musl-1.2.1/src/passwd/getpw_a.c
Examining data/musl-1.2.1/src/passwd/getpw_r.c
Examining data/musl-1.2.1/src/passwd/getpwent.c
Examining data/musl-1.2.1/src/passwd/getpwent_a.c
Examining data/musl-1.2.1/src/passwd/getspent.c
Examining data/musl-1.2.1/src/passwd/getspnam.c
Examining data/musl-1.2.1/src/passwd/getspnam_r.c
Examining data/musl-1.2.1/src/passwd/lckpwdf.c
Examining data/musl-1.2.1/src/passwd/nscd.h
Examining data/musl-1.2.1/src/passwd/nscd_query.c
Examining data/musl-1.2.1/src/passwd/putgrent.c
Examining data/musl-1.2.1/src/passwd/putpwent.c
Examining data/musl-1.2.1/src/passwd/putspent.c
Examining data/musl-1.2.1/src/passwd/pwf.h
Examining data/musl-1.2.1/src/prng/__rand48_step.c
Examining data/musl-1.2.1/src/prng/__seed48.c
Examining data/musl-1.2.1/src/prng/drand48.c
Examining data/musl-1.2.1/src/prng/lcong48.c
Examining data/musl-1.2.1/src/prng/lrand48.c
Examining data/musl-1.2.1/src/prng/mrand48.c
Examining data/musl-1.2.1/src/prng/rand.c
Examining data/musl-1.2.1/src/prng/rand48.h
Examining data/musl-1.2.1/src/prng/rand_r.c
Examining data/musl-1.2.1/src/prng/random.c
Examining data/musl-1.2.1/src/prng/seed48.c
Examining data/musl-1.2.1/src/prng/srand48.c
Examining data/musl-1.2.1/src/process/execl.c
Examining data/musl-1.2.1/src/process/execle.c
Examining data/musl-1.2.1/src/process/execlp.c
Examining data/musl-1.2.1/src/process/execv.c
Examining data/musl-1.2.1/src/process/execve.c
Examining data/musl-1.2.1/src/process/execvp.c
Examining data/musl-1.2.1/src/process/fdop.h
Examining data/musl-1.2.1/src/process/fexecve.c
Examining data/musl-1.2.1/src/process/fork.c
Examining data/musl-1.2.1/src/process/posix_spawn.c
Examining data/musl-1.2.1/src/process/posix_spawn_file_actions_addchdir.c
Examining data/musl-1.2.1/src/process/posix_spawn_file_actions_addclose.c
Examining data/musl-1.2.1/src/process/posix_spawn_file_actions_adddup2.c
Examining data/musl-1.2.1/src/process/posix_spawn_file_actions_addfchdir.c
Examining data/musl-1.2.1/src/process/posix_spawn_file_actions_addopen.c
Examining data/musl-1.2.1/src/process/posix_spawn_file_actions_destroy.c
Examining data/musl-1.2.1/src/process/posix_spawn_file_actions_init.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_destroy.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_getflags.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_getpgroup.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_getsigdefault.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_getsigmask.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_init.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_sched.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_setflags.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_setpgroup.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_setsigdefault.c
Examining data/musl-1.2.1/src/process/posix_spawnattr_setsigmask.c
Examining data/musl-1.2.1/src/process/posix_spawnp.c
Examining data/musl-1.2.1/src/process/system.c
Examining data/musl-1.2.1/src/process/vfork.c
Examining data/musl-1.2.1/src/process/wait.c
Examining data/musl-1.2.1/src/process/waitid.c
Examining data/musl-1.2.1/src/process/waitpid.c
Examining data/musl-1.2.1/src/regex/fnmatch.c
Examining data/musl-1.2.1/src/regex/glob.c
Examining data/musl-1.2.1/src/regex/regcomp.c
Examining data/musl-1.2.1/src/regex/regerror.c
Examining data/musl-1.2.1/src/regex/regexec.c
Examining data/musl-1.2.1/src/regex/tre-mem.c
Examining data/musl-1.2.1/src/regex/tre.h
Examining data/musl-1.2.1/src/sched/affinity.c
Examining data/musl-1.2.1/src/sched/sched_cpucount.c
Examining data/musl-1.2.1/src/sched/sched_get_priority_max.c
Examining data/musl-1.2.1/src/sched/sched_getcpu.c
Examining data/musl-1.2.1/src/sched/sched_getparam.c
Examining data/musl-1.2.1/src/sched/sched_getscheduler.c
Examining data/musl-1.2.1/src/sched/sched_rr_get_interval.c
Examining data/musl-1.2.1/src/sched/sched_setparam.c
Examining data/musl-1.2.1/src/sched/sched_setscheduler.c
Examining data/musl-1.2.1/src/sched/sched_yield.c
Examining data/musl-1.2.1/src/search/hsearch.c
Examining data/musl-1.2.1/src/search/insque.c
Examining data/musl-1.2.1/src/search/lsearch.c
Examining data/musl-1.2.1/src/search/tdelete.c
Examining data/musl-1.2.1/src/search/tdestroy.c
Examining data/musl-1.2.1/src/search/tfind.c
Examining data/musl-1.2.1/src/search/tsearch.c
Examining data/musl-1.2.1/src/search/tsearch.h
Examining data/musl-1.2.1/src/search/twalk.c
Examining data/musl-1.2.1/src/select/poll.c
Examining data/musl-1.2.1/src/select/pselect.c
Examining data/musl-1.2.1/src/select/select.c
Examining data/musl-1.2.1/src/setjmp/longjmp.c
Examining data/musl-1.2.1/src/setjmp/setjmp.c
Examining data/musl-1.2.1/src/signal/block.c
Examining data/musl-1.2.1/src/signal/getitimer.c
Examining data/musl-1.2.1/src/signal/kill.c
Examining data/musl-1.2.1/src/signal/killpg.c
Examining data/musl-1.2.1/src/signal/psiginfo.c
Examining data/musl-1.2.1/src/signal/psignal.c
Examining data/musl-1.2.1/src/signal/raise.c
Examining data/musl-1.2.1/src/signal/restore.c
Examining data/musl-1.2.1/src/signal/setitimer.c
Examining data/musl-1.2.1/src/signal/sigaction.c
Examining data/musl-1.2.1/src/signal/sigaddset.c
Examining data/musl-1.2.1/src/signal/sigaltstack.c
Examining data/musl-1.2.1/src/signal/sigandset.c
Examining data/musl-1.2.1/src/signal/sigdelset.c
Examining data/musl-1.2.1/src/signal/sigemptyset.c
Examining data/musl-1.2.1/src/signal/sigfillset.c
Examining data/musl-1.2.1/src/signal/sighold.c
Examining data/musl-1.2.1/src/signal/sigignore.c
Examining data/musl-1.2.1/src/signal/siginterrupt.c
Examining data/musl-1.2.1/src/signal/sigisemptyset.c
Examining data/musl-1.2.1/src/signal/sigismember.c
Examining data/musl-1.2.1/src/signal/siglongjmp.c
Examining data/musl-1.2.1/src/signal/signal.c
Examining data/musl-1.2.1/src/signal/sigorset.c
Examining data/musl-1.2.1/src/signal/sigpause.c
Examining data/musl-1.2.1/src/signal/sigpending.c
Examining data/musl-1.2.1/src/signal/sigprocmask.c
Examining data/musl-1.2.1/src/signal/sigqueue.c
Examining data/musl-1.2.1/src/signal/sigrelse.c
Examining data/musl-1.2.1/src/signal/sigrtmax.c
Examining data/musl-1.2.1/src/signal/sigrtmin.c
Examining data/musl-1.2.1/src/signal/sigset.c
Examining data/musl-1.2.1/src/signal/sigsetjmp.c
Examining data/musl-1.2.1/src/signal/sigsetjmp_tail.c
Examining data/musl-1.2.1/src/signal/sigsuspend.c
Examining data/musl-1.2.1/src/signal/sigtimedwait.c
Examining data/musl-1.2.1/src/signal/sigwait.c
Examining data/musl-1.2.1/src/signal/sigwaitinfo.c
Examining data/musl-1.2.1/src/signal/x32/getitimer.c
Examining data/musl-1.2.1/src/signal/x32/setitimer.c
Examining data/musl-1.2.1/src/stat/__xstat.c
Examining data/musl-1.2.1/src/stat/chmod.c
Examining data/musl-1.2.1/src/stat/fchmod.c
Examining data/musl-1.2.1/src/stat/fchmodat.c
Examining data/musl-1.2.1/src/stat/fstat.c
Examining data/musl-1.2.1/src/stat/fstatat.c
Examining data/musl-1.2.1/src/stat/futimens.c
Examining data/musl-1.2.1/src/stat/futimesat.c
Examining data/musl-1.2.1/src/stat/lchmod.c
Examining data/musl-1.2.1/src/stat/lstat.c
Examining data/musl-1.2.1/src/stat/mkdir.c
Examining data/musl-1.2.1/src/stat/mkdirat.c
Examining data/musl-1.2.1/src/stat/mkfifo.c
Examining data/musl-1.2.1/src/stat/mkfifoat.c
Examining data/musl-1.2.1/src/stat/mknod.c
Examining data/musl-1.2.1/src/stat/mknodat.c
Examining data/musl-1.2.1/src/stat/stat.c
Examining data/musl-1.2.1/src/stat/statvfs.c
Examining data/musl-1.2.1/src/stat/umask.c
Examining data/musl-1.2.1/src/stat/utimensat.c
Examining data/musl-1.2.1/src/stdio/__fclose_ca.c
Examining data/musl-1.2.1/src/stdio/__fdopen.c
Examining data/musl-1.2.1/src/stdio/__fmodeflags.c
Examining data/musl-1.2.1/src/stdio/__fopen_rb_ca.c
Examining data/musl-1.2.1/src/stdio/__lockfile.c
Examining data/musl-1.2.1/src/stdio/__overflow.c
Examining data/musl-1.2.1/src/stdio/__stdio_close.c
Examining data/musl-1.2.1/src/stdio/__stdio_exit.c
Examining data/musl-1.2.1/src/stdio/__stdio_read.c
Examining data/musl-1.2.1/src/stdio/__stdio_seek.c
Examining data/musl-1.2.1/src/stdio/__stdio_write.c
Examining data/musl-1.2.1/src/stdio/__stdout_write.c
Examining data/musl-1.2.1/src/stdio/__toread.c
Examining data/musl-1.2.1/src/stdio/__towrite.c
Examining data/musl-1.2.1/src/stdio/__uflow.c
Examining data/musl-1.2.1/src/stdio/asprintf.c
Examining data/musl-1.2.1/src/stdio/clearerr.c
Examining data/musl-1.2.1/src/stdio/dprintf.c
Examining data/musl-1.2.1/src/stdio/ext.c
Examining data/musl-1.2.1/src/stdio/ext2.c
Examining data/musl-1.2.1/src/stdio/fclose.c
Examining data/musl-1.2.1/src/stdio/feof.c
Examining data/musl-1.2.1/src/stdio/ferror.c
Examining data/musl-1.2.1/src/stdio/fflush.c
Examining data/musl-1.2.1/src/stdio/fgetc.c
Examining data/musl-1.2.1/src/stdio/fgetln.c
Examining data/musl-1.2.1/src/stdio/fgetpos.c
Examining data/musl-1.2.1/src/stdio/fgets.c
Examining data/musl-1.2.1/src/stdio/fgetwc.c
Examining data/musl-1.2.1/src/stdio/fgetws.c
Examining data/musl-1.2.1/src/stdio/fileno.c
Examining data/musl-1.2.1/src/stdio/flockfile.c
Examining data/musl-1.2.1/src/stdio/fmemopen.c
Examining data/musl-1.2.1/src/stdio/fopen.c
Examining data/musl-1.2.1/src/stdio/fopencookie.c
Examining data/musl-1.2.1/src/stdio/fprintf.c
Examining data/musl-1.2.1/src/stdio/fputc.c
Examining data/musl-1.2.1/src/stdio/fputs.c
Examining data/musl-1.2.1/src/stdio/fputwc.c
Examining data/musl-1.2.1/src/stdio/fputws.c
Examining data/musl-1.2.1/src/stdio/fread.c
Examining data/musl-1.2.1/src/stdio/freopen.c
Examining data/musl-1.2.1/src/stdio/fscanf.c
Examining data/musl-1.2.1/src/stdio/fseek.c
Examining data/musl-1.2.1/src/stdio/fsetpos.c
Examining data/musl-1.2.1/src/stdio/ftell.c
Examining data/musl-1.2.1/src/stdio/ftrylockfile.c
Examining data/musl-1.2.1/src/stdio/funlockfile.c
Examining data/musl-1.2.1/src/stdio/fwide.c
Examining data/musl-1.2.1/src/stdio/fwprintf.c
Examining data/musl-1.2.1/src/stdio/fwrite.c
Examining data/musl-1.2.1/src/stdio/fwscanf.c
Examining data/musl-1.2.1/src/stdio/getc.c
Examining data/musl-1.2.1/src/stdio/getc.h
Examining data/musl-1.2.1/src/stdio/getc_unlocked.c
Examining data/musl-1.2.1/src/stdio/getchar.c
Examining data/musl-1.2.1/src/stdio/getchar_unlocked.c
Examining data/musl-1.2.1/src/stdio/getdelim.c
Examining data/musl-1.2.1/src/stdio/getline.c
Examining data/musl-1.2.1/src/stdio/gets.c
Examining data/musl-1.2.1/src/stdio/getw.c
Examining data/musl-1.2.1/src/stdio/getwc.c
Examining data/musl-1.2.1/src/stdio/getwchar.c
Examining data/musl-1.2.1/src/stdio/ofl.c
Examining data/musl-1.2.1/src/stdio/ofl_add.c
Examining data/musl-1.2.1/src/stdio/open_memstream.c
Examining data/musl-1.2.1/src/stdio/open_wmemstream.c
Examining data/musl-1.2.1/src/stdio/pclose.c
Examining data/musl-1.2.1/src/stdio/perror.c
Examining data/musl-1.2.1/src/stdio/popen.c
Examining data/musl-1.2.1/src/stdio/printf.c
Examining data/musl-1.2.1/src/stdio/putc.c
Examining data/musl-1.2.1/src/stdio/putc.h
Examining data/musl-1.2.1/src/stdio/putc_unlocked.c
Examining data/musl-1.2.1/src/stdio/putchar.c
Examining data/musl-1.2.1/src/stdio/putchar_unlocked.c
Examining data/musl-1.2.1/src/stdio/puts.c
Examining data/musl-1.2.1/src/stdio/putw.c
Examining data/musl-1.2.1/src/stdio/putwc.c
Examining data/musl-1.2.1/src/stdio/putwchar.c
Examining data/musl-1.2.1/src/stdio/remove.c
Examining data/musl-1.2.1/src/stdio/rename.c
Examining data/musl-1.2.1/src/stdio/rewind.c
Examining data/musl-1.2.1/src/stdio/scanf.c
Examining data/musl-1.2.1/src/stdio/setbuf.c
Examining data/musl-1.2.1/src/stdio/setbuffer.c
Examining data/musl-1.2.1/src/stdio/setlinebuf.c
Examining data/musl-1.2.1/src/stdio/setvbuf.c
Examining data/musl-1.2.1/src/stdio/snprintf.c
Examining data/musl-1.2.1/src/stdio/sprintf.c
Examining data/musl-1.2.1/src/stdio/sscanf.c
Examining data/musl-1.2.1/src/stdio/stderr.c
Examining data/musl-1.2.1/src/stdio/stdin.c
Examining data/musl-1.2.1/src/stdio/stdout.c
Examining data/musl-1.2.1/src/stdio/swprintf.c
Examining data/musl-1.2.1/src/stdio/swscanf.c
Examining data/musl-1.2.1/src/stdio/tempnam.c
Examining data/musl-1.2.1/src/stdio/tmpfile.c
Examining data/musl-1.2.1/src/stdio/tmpnam.c
Examining data/musl-1.2.1/src/stdio/ungetc.c
Examining data/musl-1.2.1/src/stdio/ungetwc.c
Examining data/musl-1.2.1/src/stdio/vasprintf.c
Examining data/musl-1.2.1/src/stdio/vdprintf.c
Examining data/musl-1.2.1/src/stdio/vfprintf.c
Examining data/musl-1.2.1/src/stdio/vfscanf.c
Examining data/musl-1.2.1/src/stdio/vfwprintf.c
Examining data/musl-1.2.1/src/stdio/vfwscanf.c
Examining data/musl-1.2.1/src/stdio/vprintf.c
Examining data/musl-1.2.1/src/stdio/vscanf.c
Examining data/musl-1.2.1/src/stdio/vsnprintf.c
Examining data/musl-1.2.1/src/stdio/vsprintf.c
Examining data/musl-1.2.1/src/stdio/vsscanf.c
Examining data/musl-1.2.1/src/stdio/vswprintf.c
Examining data/musl-1.2.1/src/stdio/vswscanf.c
Examining data/musl-1.2.1/src/stdio/vwprintf.c
Examining data/musl-1.2.1/src/stdio/vwscanf.c
Examining data/musl-1.2.1/src/stdio/wprintf.c
Examining data/musl-1.2.1/src/stdio/wscanf.c
Examining data/musl-1.2.1/src/stdlib/abs.c
Examining data/musl-1.2.1/src/stdlib/atof.c
Examining data/musl-1.2.1/src/stdlib/atoi.c
Examining data/musl-1.2.1/src/stdlib/atol.c
Examining data/musl-1.2.1/src/stdlib/atoll.c
Examining data/musl-1.2.1/src/stdlib/bsearch.c
Examining data/musl-1.2.1/src/stdlib/div.c
Examining data/musl-1.2.1/src/stdlib/ecvt.c
Examining data/musl-1.2.1/src/stdlib/fcvt.c
Examining data/musl-1.2.1/src/stdlib/gcvt.c
Examining data/musl-1.2.1/src/stdlib/imaxabs.c
Examining data/musl-1.2.1/src/stdlib/imaxdiv.c
Examining data/musl-1.2.1/src/stdlib/labs.c
Examining data/musl-1.2.1/src/stdlib/ldiv.c
Examining data/musl-1.2.1/src/stdlib/llabs.c
Examining data/musl-1.2.1/src/stdlib/lldiv.c
Examining data/musl-1.2.1/src/stdlib/qsort.c
Examining data/musl-1.2.1/src/stdlib/strtod.c
Examining data/musl-1.2.1/src/stdlib/strtol.c
Examining data/musl-1.2.1/src/stdlib/wcstod.c
Examining data/musl-1.2.1/src/stdlib/wcstol.c
Examining data/musl-1.2.1/src/string/bcmp.c
Examining data/musl-1.2.1/src/string/bcopy.c
Examining data/musl-1.2.1/src/string/bzero.c
Examining data/musl-1.2.1/src/string/explicit_bzero.c
Examining data/musl-1.2.1/src/string/index.c
Examining data/musl-1.2.1/src/string/memccpy.c
Examining data/musl-1.2.1/src/string/memchr.c
Examining data/musl-1.2.1/src/string/memcmp.c
Examining data/musl-1.2.1/src/string/memcpy.c
Examining data/musl-1.2.1/src/string/memmem.c
Examining data/musl-1.2.1/src/string/memmove.c
Examining data/musl-1.2.1/src/string/mempcpy.c
Examining data/musl-1.2.1/src/string/memrchr.c
Examining data/musl-1.2.1/src/string/memset.c
Examining data/musl-1.2.1/src/string/rindex.c
Examining data/musl-1.2.1/src/string/stpcpy.c
Examining data/musl-1.2.1/src/string/stpncpy.c
Examining data/musl-1.2.1/src/string/strcasecmp.c
Examining data/musl-1.2.1/src/string/strcasestr.c
Examining data/musl-1.2.1/src/string/strcat.c
Examining data/musl-1.2.1/src/string/strchr.c
Examining data/musl-1.2.1/src/string/strchrnul.c
Examining data/musl-1.2.1/src/string/strcmp.c
Examining data/musl-1.2.1/src/string/strcpy.c
Examining data/musl-1.2.1/src/string/strcspn.c
Examining data/musl-1.2.1/src/string/strdup.c
Examining data/musl-1.2.1/src/string/strerror_r.c
Examining data/musl-1.2.1/src/string/strlcat.c
Examining data/musl-1.2.1/src/string/strlcpy.c
Examining data/musl-1.2.1/src/string/strlen.c
Examining data/musl-1.2.1/src/string/strncasecmp.c
Examining data/musl-1.2.1/src/string/strncat.c
Examining data/musl-1.2.1/src/string/strncmp.c
Examining data/musl-1.2.1/src/string/strncpy.c
Examining data/musl-1.2.1/src/string/strndup.c
Examining data/musl-1.2.1/src/string/strnlen.c
Examining data/musl-1.2.1/src/string/strpbrk.c
Examining data/musl-1.2.1/src/string/strrchr.c
Examining data/musl-1.2.1/src/string/strsep.c
Examining data/musl-1.2.1/src/string/strsignal.c
Examining data/musl-1.2.1/src/string/strspn.c
Examining data/musl-1.2.1/src/string/strstr.c
Examining data/musl-1.2.1/src/string/strtok.c
Examining data/musl-1.2.1/src/string/strtok_r.c
Examining data/musl-1.2.1/src/string/strverscmp.c
Examining data/musl-1.2.1/src/string/swab.c
Examining data/musl-1.2.1/src/string/wcpcpy.c
Examining data/musl-1.2.1/src/string/wcpncpy.c
Examining data/musl-1.2.1/src/string/wcscasecmp.c
Examining data/musl-1.2.1/src/string/wcscasecmp_l.c
Examining data/musl-1.2.1/src/string/wcscat.c
Examining data/musl-1.2.1/src/string/wcschr.c
Examining data/musl-1.2.1/src/string/wcscmp.c
Examining data/musl-1.2.1/src/string/wcscpy.c
Examining data/musl-1.2.1/src/string/wcscspn.c
Examining data/musl-1.2.1/src/string/wcsdup.c
Examining data/musl-1.2.1/src/string/wcslen.c
Examining data/musl-1.2.1/src/string/wcsncasecmp.c
Examining data/musl-1.2.1/src/string/wcsncasecmp_l.c
Examining data/musl-1.2.1/src/string/wcsncat.c
Examining data/musl-1.2.1/src/string/wcsncmp.c
Examining data/musl-1.2.1/src/string/wcsncpy.c
Examining data/musl-1.2.1/src/string/wcsnlen.c
Examining data/musl-1.2.1/src/string/wcspbrk.c
Examining data/musl-1.2.1/src/string/wcsrchr.c
Examining data/musl-1.2.1/src/string/wcsspn.c
Examining data/musl-1.2.1/src/string/wcsstr.c
Examining data/musl-1.2.1/src/string/wcstok.c
Examining data/musl-1.2.1/src/string/wcswcs.c
Examining data/musl-1.2.1/src/string/wmemchr.c
Examining data/musl-1.2.1/src/string/wmemcmp.c
Examining data/musl-1.2.1/src/string/wmemcpy.c
Examining data/musl-1.2.1/src/string/wmemmove.c
Examining data/musl-1.2.1/src/string/wmemset.c
Examining data/musl-1.2.1/src/temp/__randname.c
Examining data/musl-1.2.1/src/temp/mkdtemp.c
Examining data/musl-1.2.1/src/temp/mkostemp.c
Examining data/musl-1.2.1/src/temp/mkostemps.c
Examining data/musl-1.2.1/src/temp/mkstemp.c
Examining data/musl-1.2.1/src/temp/mkstemps.c
Examining data/musl-1.2.1/src/temp/mktemp.c
Examining data/musl-1.2.1/src/termios/cfgetospeed.c
Examining data/musl-1.2.1/src/termios/cfmakeraw.c
Examining data/musl-1.2.1/src/termios/cfsetospeed.c
Examining data/musl-1.2.1/src/termios/tcdrain.c
Examining data/musl-1.2.1/src/termios/tcflow.c
Examining data/musl-1.2.1/src/termios/tcflush.c
Examining data/musl-1.2.1/src/termios/tcgetattr.c
Examining data/musl-1.2.1/src/termios/tcgetsid.c
Examining data/musl-1.2.1/src/termios/tcsendbreak.c
Examining data/musl-1.2.1/src/termios/tcsetattr.c
Examining data/musl-1.2.1/src/thread/__lock.c
Examining data/musl-1.2.1/src/thread/__set_thread_area.c
Examining data/musl-1.2.1/src/thread/__syscall_cp.c
Examining data/musl-1.2.1/src/thread/__timedwait.c
Examining data/musl-1.2.1/src/thread/__tls_get_addr.c
Examining data/musl-1.2.1/src/thread/__unmapself.c
Examining data/musl-1.2.1/src/thread/__wait.c
Examining data/musl-1.2.1/src/thread/arm/__set_thread_area.c
Examining data/musl-1.2.1/src/thread/call_once.c
Examining data/musl-1.2.1/src/thread/clone.c
Examining data/musl-1.2.1/src/thread/cnd_broadcast.c
Examining data/musl-1.2.1/src/thread/cnd_destroy.c
Examining data/musl-1.2.1/src/thread/cnd_init.c
Examining data/musl-1.2.1/src/thread/cnd_signal.c
Examining data/musl-1.2.1/src/thread/cnd_timedwait.c
Examining data/musl-1.2.1/src/thread/cnd_wait.c
Examining data/musl-1.2.1/src/thread/default_attr.c
Examining data/musl-1.2.1/src/thread/lock_ptc.c
Examining data/musl-1.2.1/src/thread/mtx_destroy.c
Examining data/musl-1.2.1/src/thread/mtx_init.c
Examining data/musl-1.2.1/src/thread/mtx_lock.c
Examining data/musl-1.2.1/src/thread/mtx_timedlock.c
Examining data/musl-1.2.1/src/thread/mtx_trylock.c
Examining data/musl-1.2.1/src/thread/mtx_unlock.c
Examining data/musl-1.2.1/src/thread/pthread_atfork.c
Examining data/musl-1.2.1/src/thread/pthread_attr_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_attr_get.c
Examining data/musl-1.2.1/src/thread/pthread_attr_init.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setdetachstate.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setguardsize.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setinheritsched.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setschedparam.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setschedpolicy.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setscope.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setstack.c
Examining data/musl-1.2.1/src/thread/pthread_attr_setstacksize.c
Examining data/musl-1.2.1/src/thread/pthread_barrier_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_barrier_init.c
Examining data/musl-1.2.1/src/thread/pthread_barrier_wait.c
Examining data/musl-1.2.1/src/thread/pthread_barrierattr_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_barrierattr_init.c
Examining data/musl-1.2.1/src/thread/pthread_barrierattr_setpshared.c
Examining data/musl-1.2.1/src/thread/pthread_cancel.c
Examining data/musl-1.2.1/src/thread/pthread_cleanup_push.c
Examining data/musl-1.2.1/src/thread/pthread_cond_broadcast.c
Examining data/musl-1.2.1/src/thread/pthread_cond_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_cond_init.c
Examining data/musl-1.2.1/src/thread/pthread_cond_signal.c
Examining data/musl-1.2.1/src/thread/pthread_cond_timedwait.c
Examining data/musl-1.2.1/src/thread/pthread_cond_wait.c
Examining data/musl-1.2.1/src/thread/pthread_condattr_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_condattr_init.c
Examining data/musl-1.2.1/src/thread/pthread_condattr_setclock.c
Examining data/musl-1.2.1/src/thread/pthread_condattr_setpshared.c
Examining data/musl-1.2.1/src/thread/pthread_create.c
Examining data/musl-1.2.1/src/thread/pthread_detach.c
Examining data/musl-1.2.1/src/thread/pthread_equal.c
Examining data/musl-1.2.1/src/thread/pthread_getattr_np.c
Examining data/musl-1.2.1/src/thread/pthread_getconcurrency.c
Examining data/musl-1.2.1/src/thread/pthread_getcpuclockid.c
Examining data/musl-1.2.1/src/thread/pthread_getschedparam.c
Examining data/musl-1.2.1/src/thread/pthread_getspecific.c
Examining data/musl-1.2.1/src/thread/pthread_join.c
Examining data/musl-1.2.1/src/thread/pthread_key_create.c
Examining data/musl-1.2.1/src/thread/pthread_kill.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_consistent.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_getprioceiling.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_init.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_lock.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_setprioceiling.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_timedlock.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_trylock.c
Examining data/musl-1.2.1/src/thread/pthread_mutex_unlock.c
Examining data/musl-1.2.1/src/thread/pthread_mutexattr_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_mutexattr_init.c
Examining data/musl-1.2.1/src/thread/pthread_mutexattr_setprotocol.c
Examining data/musl-1.2.1/src/thread/pthread_mutexattr_setpshared.c
Examining data/musl-1.2.1/src/thread/pthread_mutexattr_setrobust.c
Examining data/musl-1.2.1/src/thread/pthread_mutexattr_settype.c
Examining data/musl-1.2.1/src/thread/pthread_once.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_init.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_rdlock.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_timedrdlock.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_timedwrlock.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_tryrdlock.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_trywrlock.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_unlock.c
Examining data/musl-1.2.1/src/thread/pthread_rwlock_wrlock.c
Examining data/musl-1.2.1/src/thread/pthread_rwlockattr_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_rwlockattr_init.c
Examining data/musl-1.2.1/src/thread/pthread_rwlockattr_setpshared.c
Examining data/musl-1.2.1/src/thread/pthread_self.c
Examining data/musl-1.2.1/src/thread/pthread_setattr_default_np.c
Examining data/musl-1.2.1/src/thread/pthread_setcancelstate.c
Examining data/musl-1.2.1/src/thread/pthread_setcanceltype.c
Examining data/musl-1.2.1/src/thread/pthread_setconcurrency.c
Examining data/musl-1.2.1/src/thread/pthread_setname_np.c
Examining data/musl-1.2.1/src/thread/pthread_setschedparam.c
Examining data/musl-1.2.1/src/thread/pthread_setschedprio.c
Examining data/musl-1.2.1/src/thread/pthread_setspecific.c
Examining data/musl-1.2.1/src/thread/pthread_sigmask.c
Examining data/musl-1.2.1/src/thread/pthread_spin_destroy.c
Examining data/musl-1.2.1/src/thread/pthread_spin_init.c
Examining data/musl-1.2.1/src/thread/pthread_spin_lock.c
Examining data/musl-1.2.1/src/thread/pthread_spin_trylock.c
Examining data/musl-1.2.1/src/thread/pthread_spin_unlock.c
Examining data/musl-1.2.1/src/thread/pthread_testcancel.c
Examining data/musl-1.2.1/src/thread/sem_destroy.c
Examining data/musl-1.2.1/src/thread/sem_getvalue.c
Examining data/musl-1.2.1/src/thread/sem_init.c
Examining data/musl-1.2.1/src/thread/sem_open.c
Examining data/musl-1.2.1/src/thread/sem_post.c
Examining data/musl-1.2.1/src/thread/sem_timedwait.c
Examining data/musl-1.2.1/src/thread/sem_trywait.c
Examining data/musl-1.2.1/src/thread/sem_unlink.c
Examining data/musl-1.2.1/src/thread/sem_wait.c
Examining data/musl-1.2.1/src/thread/sh/__set_thread_area.c
Examining data/musl-1.2.1/src/thread/sh/__unmapself.c
Examining data/musl-1.2.1/src/thread/synccall.c
Examining data/musl-1.2.1/src/thread/syscall_cp.c
Examining data/musl-1.2.1/src/thread/thrd_create.c
Examining data/musl-1.2.1/src/thread/thrd_exit.c
Examining data/musl-1.2.1/src/thread/thrd_join.c
Examining data/musl-1.2.1/src/thread/thrd_sleep.c
Examining data/musl-1.2.1/src/thread/thrd_yield.c
Examining data/musl-1.2.1/src/thread/tls.c
Examining data/musl-1.2.1/src/thread/tss_create.c
Examining data/musl-1.2.1/src/thread/tss_delete.c
Examining data/musl-1.2.1/src/thread/tss_set.c
Examining data/musl-1.2.1/src/thread/vmlock.c
Examining data/musl-1.2.1/src/time/__map_file.c
Examining data/musl-1.2.1/src/time/__month_to_secs.c
Examining data/musl-1.2.1/src/time/__secs_to_tm.c
Examining data/musl-1.2.1/src/time/__tm_to_secs.c
Examining data/musl-1.2.1/src/time/__tz.c
Examining data/musl-1.2.1/src/time/__year_to_secs.c
Examining data/musl-1.2.1/src/time/asctime.c
Examining data/musl-1.2.1/src/time/asctime_r.c
Examining data/musl-1.2.1/src/time/clock.c
Examining data/musl-1.2.1/src/time/clock_getcpuclockid.c
Examining data/musl-1.2.1/src/time/clock_getres.c
Examining data/musl-1.2.1/src/time/clock_gettime.c
Examining data/musl-1.2.1/src/time/clock_nanosleep.c
Examining data/musl-1.2.1/src/time/clock_settime.c
Examining data/musl-1.2.1/src/time/ctime.c
Examining data/musl-1.2.1/src/time/ctime_r.c
Examining data/musl-1.2.1/src/time/difftime.c
Examining data/musl-1.2.1/src/time/ftime.c
Examining data/musl-1.2.1/src/time/getdate.c
Examining data/musl-1.2.1/src/time/gettimeofday.c
Examining data/musl-1.2.1/src/time/gmtime.c
Examining data/musl-1.2.1/src/time/gmtime_r.c
Examining data/musl-1.2.1/src/time/localtime.c
Examining data/musl-1.2.1/src/time/localtime_r.c
Examining data/musl-1.2.1/src/time/mktime.c
Examining data/musl-1.2.1/src/time/nanosleep.c
Examining data/musl-1.2.1/src/time/strftime.c
Examining data/musl-1.2.1/src/time/strptime.c
Examining data/musl-1.2.1/src/time/time.c
Examining data/musl-1.2.1/src/time/time_impl.h
Examining data/musl-1.2.1/src/time/timegm.c
Examining data/musl-1.2.1/src/time/timer_create.c
Examining data/musl-1.2.1/src/time/timer_delete.c
Examining data/musl-1.2.1/src/time/timer_getoverrun.c
Examining data/musl-1.2.1/src/time/timer_gettime.c
Examining data/musl-1.2.1/src/time/timer_settime.c
Examining data/musl-1.2.1/src/time/times.c
Examining data/musl-1.2.1/src/time/timespec_get.c
Examining data/musl-1.2.1/src/time/utime.c
Examining data/musl-1.2.1/src/time/wcsftime.c
Examining data/musl-1.2.1/src/unistd/_exit.c
Examining data/musl-1.2.1/src/unistd/access.c
Examining data/musl-1.2.1/src/unistd/acct.c
Examining data/musl-1.2.1/src/unistd/alarm.c
Examining data/musl-1.2.1/src/unistd/chdir.c
Examining data/musl-1.2.1/src/unistd/chown.c
Examining data/musl-1.2.1/src/unistd/close.c
Examining data/musl-1.2.1/src/unistd/ctermid.c
Examining data/musl-1.2.1/src/unistd/dup.c
Examining data/musl-1.2.1/src/unistd/dup2.c
Examining data/musl-1.2.1/src/unistd/dup3.c
Examining data/musl-1.2.1/src/unistd/faccessat.c
Examining data/musl-1.2.1/src/unistd/fchdir.c
Examining data/musl-1.2.1/src/unistd/fchown.c
Examining data/musl-1.2.1/src/unistd/fchownat.c
Examining data/musl-1.2.1/src/unistd/fdatasync.c
Examining data/musl-1.2.1/src/unistd/fsync.c
Examining data/musl-1.2.1/src/unistd/ftruncate.c
Examining data/musl-1.2.1/src/unistd/getcwd.c
Examining data/musl-1.2.1/src/unistd/getegid.c
Examining data/musl-1.2.1/src/unistd/geteuid.c
Examining data/musl-1.2.1/src/unistd/getgid.c
Examining data/musl-1.2.1/src/unistd/getgroups.c
Examining data/musl-1.2.1/src/unistd/gethostname.c
Examining data/musl-1.2.1/src/unistd/getlogin.c
Examining data/musl-1.2.1/src/unistd/getlogin_r.c
Examining data/musl-1.2.1/src/unistd/getpgid.c
Examining data/musl-1.2.1/src/unistd/getpgrp.c
Examining data/musl-1.2.1/src/unistd/getpid.c
Examining data/musl-1.2.1/src/unistd/getppid.c
Examining data/musl-1.2.1/src/unistd/getsid.c
Examining data/musl-1.2.1/src/unistd/getuid.c
Examining data/musl-1.2.1/src/unistd/isatty.c
Examining data/musl-1.2.1/src/unistd/lchown.c
Examining data/musl-1.2.1/src/unistd/link.c
Examining data/musl-1.2.1/src/unistd/linkat.c
Examining data/musl-1.2.1/src/unistd/lseek.c
Examining data/musl-1.2.1/src/unistd/mipsn32/lseek.c
Examining data/musl-1.2.1/src/unistd/nice.c
Examining data/musl-1.2.1/src/unistd/pause.c
Examining data/musl-1.2.1/src/unistd/pipe.c
Examining data/musl-1.2.1/src/unistd/pipe2.c
Examining data/musl-1.2.1/src/unistd/posix_close.c
Examining data/musl-1.2.1/src/unistd/pread.c
Examining data/musl-1.2.1/src/unistd/preadv.c
Examining data/musl-1.2.1/src/unistd/pwrite.c
Examining data/musl-1.2.1/src/unistd/pwritev.c
Examining data/musl-1.2.1/src/unistd/read.c
Examining data/musl-1.2.1/src/unistd/readlink.c
Examining data/musl-1.2.1/src/unistd/readlinkat.c
Examining data/musl-1.2.1/src/unistd/readv.c
Examining data/musl-1.2.1/src/unistd/renameat.c
Examining data/musl-1.2.1/src/unistd/rmdir.c
Examining data/musl-1.2.1/src/unistd/setegid.c
Examining data/musl-1.2.1/src/unistd/seteuid.c
Examining data/musl-1.2.1/src/unistd/setgid.c
Examining data/musl-1.2.1/src/unistd/setpgid.c
Examining data/musl-1.2.1/src/unistd/setpgrp.c
Examining data/musl-1.2.1/src/unistd/setregid.c
Examining data/musl-1.2.1/src/unistd/setresgid.c
Examining data/musl-1.2.1/src/unistd/setresuid.c
Examining data/musl-1.2.1/src/unistd/setreuid.c
Examining data/musl-1.2.1/src/unistd/setsid.c
Examining data/musl-1.2.1/src/unistd/setuid.c
Examining data/musl-1.2.1/src/unistd/setxid.c
Examining data/musl-1.2.1/src/unistd/sleep.c
Examining data/musl-1.2.1/src/unistd/symlink.c
Examining data/musl-1.2.1/src/unistd/symlinkat.c
Examining data/musl-1.2.1/src/unistd/sync.c
Examining data/musl-1.2.1/src/unistd/tcgetpgrp.c
Examining data/musl-1.2.1/src/unistd/tcsetpgrp.c
Examining data/musl-1.2.1/src/unistd/truncate.c
Examining data/musl-1.2.1/src/unistd/ttyname.c
Examining data/musl-1.2.1/src/unistd/ttyname_r.c
Examining data/musl-1.2.1/src/unistd/ualarm.c
Examining data/musl-1.2.1/src/unistd/unlink.c
Examining data/musl-1.2.1/src/unistd/unlinkat.c
Examining data/musl-1.2.1/src/unistd/usleep.c
Examining data/musl-1.2.1/src/unistd/write.c
Examining data/musl-1.2.1/src/unistd/writev.c
Examining data/musl-1.2.1/src/unistd/x32/lseek.c

FINAL RESULTS:

data/musl-1.2.1/include/stdio.h:101:7:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
char *gets(char *);
data/musl-1.2.1/include/sys/stat.h:77:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int chmod(const char *, mode_t);
data/musl-1.2.1/include/unistd.h:51:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
int chown(const char *, uid_t, gid_t);
data/musl-1.2.1/include/unistd.h:60:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
ssize_t readlink(const char *__restrict, char *__restrict, size_t);
data/musl-1.2.1/ldso/dynlink.c:844:7:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		l = readlink("/proc/self/exe", buf, buf_size);
data/musl-1.2.1/src/misc/realpath.c:27:6:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	r = readlink(buf, tmp, sizeof tmp - 1);
data/musl-1.2.1/src/stat/chmod.c:5:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int chmod(const char *path, mode_t mode)
data/musl-1.2.1/src/stdio/gets.c:5:7:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
char *gets(char *s)
data/musl-1.2.1/src/unistd/chown.c:5:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
int chown(const char *path, uid_t uid, gid_t gid)
data/musl-1.2.1/src/unistd/readlink.c:5:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
ssize_t readlink(const char *restrict path, char *restrict buf, size_t bufsize)
data/musl-1.2.1/src/unistd/ttyname_r.c:15:6:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	l = readlink(procname, name, size);
data/musl-1.2.1/include/crypt.h:13:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt(const char *, const char *);
data/musl-1.2.1/include/crypt.h:14:7:  [4] (crypto) crypt_r:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt_r(const char *, const char *, struct crypt_data *);
data/musl-1.2.1/include/stdio.h:107:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int printf(const char *__restrict, ...);
data/musl-1.2.1/include/stdio.h:108:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int fprintf(FILE *__restrict, const char *__restrict, ...);
data/musl-1.2.1/include/stdio.h:109:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char *__restrict, const char *__restrict, ...);
data/musl-1.2.1/include/stdio.h:110:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int snprintf(char *__restrict, size_t, const char *__restrict, ...);
data/musl-1.2.1/include/stdio.h:112:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vprintf(const char *__restrict, __isoc_va_list);
data/musl-1.2.1/include/stdio.h:113:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vfprintf(FILE *__restrict, const char *__restrict, __isoc_va_list);
data/musl-1.2.1/include/stdio.h:114:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vsprintf(char *__restrict, const char *__restrict, __isoc_va_list);
data/musl-1.2.1/include/stdio.h:115:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int vsnprintf(char *__restrict, size_t, const char *__restrict, __isoc_va_list);
data/musl-1.2.1/include/stdio.h:117:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int scanf(const char *__restrict, ...);
data/musl-1.2.1/include/stdio.h:118:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int fscanf(FILE *__restrict, const char *__restrict, ...);
data/musl-1.2.1/include/stdio.h:119:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int sscanf(const char *__restrict, const char *__restrict, ...);
data/musl-1.2.1/include/stdio.h:120:5:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vscanf(const char *__restrict, __isoc_va_list);
data/musl-1.2.1/include/stdio.h:121:5:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vfscanf(FILE *__restrict, const char *__restrict, __isoc_va_list);
data/musl-1.2.1/include/stdio.h:122:5:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vsscanf(const char *__restrict, const char *__restrict, __isoc_va_list);
data/musl-1.2.1/include/stdio.h:138:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
FILE *popen(const char *, const char *);
data/musl-1.2.1/include/stdio.h:168:7:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
char *cuserid(char *);
data/musl-1.2.1/include/stdlib.h:53:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int system (const char *);
data/musl-1.2.1/include/stdlib.h:139:7:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
char *mktemp (char *);
data/musl-1.2.1/include/string.h:31:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char *strcpy (char *__restrict, const char *__restrict);
data/musl-1.2.1/include/string.h:34:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char *strcat (char *__restrict, const char *__restrict);
data/musl-1.2.1/include/string.h:89:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define	strdupa(x)	strcpy(alloca(strlen(x)+1),x)
data/musl-1.2.1/include/syslog.h:62:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int, const char *, ...);
data/musl-1.2.1/include/unistd.h:73:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int access(const char *, int);
data/musl-1.2.1/include/unistd.h:86:5:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execv(const char *, char *const []);
data/musl-1.2.1/include/unistd.h:87:5:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execle(const char *, const char *, ...);
data/musl-1.2.1/include/unistd.h:88:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execl(const char *, const char *, ...);
data/musl-1.2.1/include/unistd.h:89:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execvp(const char *, char *const []);
data/musl-1.2.1/include/unistd.h:90:5:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execlp(const char *, const char *, ...);
data/musl-1.2.1/include/unistd.h:117:7:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
char *getlogin(void);
data/musl-1.2.1/include/unistd.h:143:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt(const char *, const char *);
data/musl-1.2.1/include/unistd.h:169:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass(const char *);
data/musl-1.2.1/include/wchar.h:50:10:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
wchar_t *wcscpy (wchar_t *__restrict, const wchar_t *__restrict);
data/musl-1.2.1/include/wchar.h:53:10:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
wchar_t *wcscat (wchar_t *__restrict, const wchar_t *__restrict);
data/musl-1.2.1/include/wchar.h:109:5:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int wprintf (const wchar_t *__restrict, ...);
data/musl-1.2.1/include/wchar.h:110:5:  [4] (format) fwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int fwprintf (FILE *__restrict, const wchar_t *__restrict, ...);
data/musl-1.2.1/include/wchar.h:111:5:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
int swprintf (wchar_t *__restrict, size_t, const wchar_t *__restrict, ...);
data/musl-1.2.1/include/wchar.h:113:5:  [4] (format) vwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vwprintf (const wchar_t *__restrict, __isoc_va_list);
data/musl-1.2.1/include/wchar.h:114:5:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vfwprintf (FILE *__restrict, const wchar_t *__restrict, __isoc_va_list);
data/musl-1.2.1/include/wchar.h:115:5:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vswprintf (wchar_t *__restrict, size_t, const wchar_t *__restrict, __isoc_va_list);
data/musl-1.2.1/include/wchar.h:117:5:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int wscanf (const wchar_t *__restrict, ...);
data/musl-1.2.1/include/wchar.h:118:5:  [4] (buffer) fwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int fwscanf (FILE *__restrict, const wchar_t *__restrict, ...);
data/musl-1.2.1/include/wchar.h:121:5:  [4] (buffer) vwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vwscanf (const wchar_t *__restrict, __isoc_va_list);
data/musl-1.2.1/include/wchar.h:122:5:  [4] (buffer) vfwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vfwscanf (FILE *__restrict, const wchar_t *__restrict, __isoc_va_list);
data/musl-1.2.1/include/wchar.h:123:5:  [4] (buffer) vswscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vswscanf (const wchar_t *__restrict, const wchar_t *__restrict, __isoc_va_list);
data/musl-1.2.1/ldso/dynlink.c:888:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(d, s);
data/musl-1.2.1/ldso/dynlink.c:1138:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(p->name, pathname);
data/musl-1.2.1/src/crypt/crypt.c:4:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt(const char *key, const char *salt)
data/musl-1.2.1/src/crypt/crypt_r.c:23:23:  [4] (crypto) crypt_r:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
weak_alias(__crypt_r, crypt_r);
data/musl-1.2.1/src/crypt/crypt_sha256.c:297:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	p += sprintf(p, "$5$%s%.*s$", rounds, slen, salt);
data/musl-1.2.1/src/crypt/crypt_sha512.c:319:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	p += sprintf(p, "$6$%s%.*s$", rounds, slen, salt);
data/musl-1.2.1/src/ldso/dlerror.c:50:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	size_t len = vsnprintf(0, 0, fmt, ap2);
data/musl-1.2.1/src/ldso/dlerror.c:55:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		vsnprintf(buf, len+1, fmt, ap);
data/musl-1.2.1/src/legacy/cuserid.c:6:7:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
char *cuserid(char *buf)
data/musl-1.2.1/src/legacy/err.c:12:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, fmt, ap);
data/musl-1.2.1/src/legacy/err.c:21:11:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	if (fmt) vfprintf(stderr, fmt, ap);
data/musl-1.2.1/src/legacy/getpass.c:8:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass(const char *prompt)
data/musl-1.2.1/src/locale/strxfrm.c:9:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if (n > l) strcpy(dest, src);
data/musl-1.2.1/src/misc/getdomainname.c:15:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(name, temp.domainname);
data/musl-1.2.1/src/misc/nftw.c:101:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(path+j+1, de->d_name);
data/musl-1.2.1/src/misc/realpath.c:39:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return resolved ? strcpy(resolved, tmp) : strdup(tmp);
data/musl-1.2.1/src/misc/syslog.c:106:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	l2 = vsnprintf(buf+l, sizeof buf - l, message, ap);
data/musl-1.2.1/src/misc/syslog.c:136:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog(int priority, const char *message, ...)
data/musl-1.2.1/src/misc/wordexp.c:111:3:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execl("/bin/sh", "sh", "-c",
data/musl-1.2.1/src/network/ether.c:35:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		x += sprintf (x, ii == 0 ? "%.2X" : ":%.2X", p_a->ether_addr_octet[ii]);
data/musl-1.2.1/src/network/gethostbyname2_r.c:67:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(h->h_name, canon);
data/musl-1.2.1/src/network/gethostbyname2_r.c:72:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(h->h_aliases[1], name);
data/musl-1.2.1/src/network/getnameinfo.c:179:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(buf, p);
data/musl-1.2.1/src/network/getnameinfo.c:183:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(node, buf);
data/musl-1.2.1/src/network/getnameinfo.c:196:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(serv, p);
data/musl-1.2.1/src/network/inet_ntop.c:44:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(s, buf);
data/musl-1.2.1/src/network/lookup_name.c:127:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(ctx->canon, tmp);
data/musl-1.2.1/src/process/execl.c:4:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execl(const char *path, const char *argv0, ...)
data/musl-1.2.1/src/process/execl.c:20:10:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		return execv(path, argv);
data/musl-1.2.1/src/process/execle.c:4:5:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execle(const char *path, const char *argv0, ...)
data/musl-1.2.1/src/process/execlp.c:4:5:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execlp(const char *file, const char *argv0, ...)
data/musl-1.2.1/src/process/execlp.c:20:10:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		return execvp(file, argv);
data/musl-1.2.1/src/process/execv.c:5:5:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execv(const char *path, char *const argv[])
data/musl-1.2.1/src/process/execvp.c:55:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int execvp(const char *file, char *const argv[])
data/musl-1.2.1/src/process/posix_spawn_file_actions_addchdir.c:13:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(op->path, path);
data/musl-1.2.1/src/process/posix_spawn_file_actions_addopen.c:15:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(op->path, path);
data/musl-1.2.1/src/process/system.c:11:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int system(const char *cmd)
data/musl-1.2.1/src/stdio/fprintf.c:4:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int fprintf(FILE *restrict f, const char *restrict fmt, ...)
data/musl-1.2.1/src/stdio/fprintf.c:9:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vfprintf(f, fmt, ap);
data/musl-1.2.1/src/stdio/fscanf.c:4:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int fscanf(FILE *restrict f, const char *restrict fmt, ...)
data/musl-1.2.1/src/stdio/fscanf.c:9:8:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	ret = vfscanf(f, fmt, ap);
data/musl-1.2.1/src/stdio/fscanf.c:14:12:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(fscanf, __isoc99_fscanf);
data/musl-1.2.1/src/stdio/fwprintf.c:5:5:  [4] (format) fwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int fwprintf(FILE *restrict f, const wchar_t *restrict fmt, ...)
data/musl-1.2.1/src/stdio/fwprintf.c:10:8:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vfwprintf(f, fmt, ap);
data/musl-1.2.1/src/stdio/fwscanf.c:5:5:  [4] (buffer) fwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int fwscanf(FILE *restrict f, const wchar_t *restrict fmt, ...)
data/musl-1.2.1/src/stdio/fwscanf.c:10:8:  [4] (buffer) vfwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	ret = vfwscanf(f, fmt, ap);
data/musl-1.2.1/src/stdio/fwscanf.c:15:12:  [4] (buffer) fwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(fwscanf,__isoc99_fwscanf);
data/musl-1.2.1/src/stdio/popen.c:11:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
FILE *popen(const char *cmd, const char *mode)
data/musl-1.2.1/src/stdio/printf.c:4:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int printf(const char *restrict fmt, ...)
data/musl-1.2.1/src/stdio/printf.c:9:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vfprintf(stdout, fmt, ap);
data/musl-1.2.1/src/stdio/scanf.c:4:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int scanf(const char *restrict fmt, ...)
data/musl-1.2.1/src/stdio/scanf.c:9:8:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	ret = vscanf(fmt, ap);
data/musl-1.2.1/src/stdio/scanf.c:14:12:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(scanf,__isoc99_scanf);
data/musl-1.2.1/src/stdio/snprintf.c:4:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int snprintf(char *restrict s, size_t n, const char *restrict fmt, ...)
data/musl-1.2.1/src/stdio/snprintf.c:9:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(s, n, fmt, ap);
data/musl-1.2.1/src/stdio/sprintf.c:4:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char *restrict s, const char *restrict fmt, ...)
data/musl-1.2.1/src/stdio/sprintf.c:9:8:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	ret = vsprintf(s, fmt, ap);
data/musl-1.2.1/src/stdio/sscanf.c:4:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int sscanf(const char *restrict s, const char *restrict fmt, ...)
data/musl-1.2.1/src/stdio/sscanf.c:9:8:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	ret = vsscanf(s, fmt, ap);
data/musl-1.2.1/src/stdio/sscanf.c:14:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(sscanf,__isoc99_sscanf);
data/musl-1.2.1/src/stdio/swprintf.c:4:5:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
int swprintf(wchar_t *restrict s, size_t n, const wchar_t *restrict fmt, ...)
data/musl-1.2.1/src/stdio/swprintf.c:9:8:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
	ret = vswprintf(s, n, fmt, ap);
data/musl-1.2.1/src/stdio/swscanf.c:9:8:  [4] (buffer) vswscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	ret = vswscanf(s, fmt, ap);
data/musl-1.2.1/src/stdio/tmpnam.c:26:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		if (r == -ENOENT) return strcpy(buf ? buf : internal, s);
data/musl-1.2.1/src/stdio/vasprintf.c:10:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int l = vsnprintf(0, 0, fmt, ap2);
data/musl-1.2.1/src/stdio/vasprintf.c:14:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	return vsnprintf(*s, l+1U, fmt, ap);
data/musl-1.2.1/src/stdio/vdprintf.c:10:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vfprintf(&f, fmt, ap);
data/musl-1.2.1/src/stdio/vfprintf.c:657:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vfprintf(FILE *restrict f, const char *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vfscanf.c:56:5:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vfscanf(FILE *restrict f, const char *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vfscanf.c:339:12:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(vfscanf,__isoc99_vfscanf);
data/musl-1.2.1/src/stdio/vfwprintf.c:315:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			l = fprintf(f, charfmt, w, p, arg.f);
data/musl-1.2.1/src/stdio/vfwprintf.c:318:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			l = fprintf(f, charfmt, w, p, arg.i);
data/musl-1.2.1/src/stdio/vfwprintf.c:340:5:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vfwprintf(FILE *restrict f, const wchar_t *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vfwscanf.c:86:5:  [4] (buffer) vfwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vfwscanf(FILE *restrict f, const wchar_t *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vfwscanf.c:305:8:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			if (fscanf(f, tmp, dest?dest:&cnt, &cnt) == -1)
data/musl-1.2.1/src/stdio/vfwscanf.c:332:12:  [4] (buffer) vfwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(vfwscanf,__isoc99_vfwscanf);
data/musl-1.2.1/src/stdio/vprintf.c:3:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vprintf(const char *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vprintf.c:5:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vfprintf(stdout, fmt, ap);
data/musl-1.2.1/src/stdio/vscanf.c:4:5:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vscanf(const char *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vscanf.c:6:9:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	return vfscanf(stdin, fmt, ap);
data/musl-1.2.1/src/stdio/vscanf.c:9:12:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(vscanf,__isoc99_vscanf);
data/musl-1.2.1/src/stdio/vsnprintf.c:35:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int vsnprintf(char *restrict s, size_t n, const char *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vsnprintf.c:54:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vfprintf(&f, fmt, ap);
data/musl-1.2.1/src/stdio/vsprintf.c:4:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vsprintf(char *restrict s, const char *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vsprintf.c:6:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	return vsnprintf(s, INT_MAX, fmt, ap);
data/musl-1.2.1/src/stdio/vsscanf.c:18:5:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vsscanf(const char *restrict s, const char *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vsscanf.c:24:9:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	return vfscanf(&f, fmt, ap);
data/musl-1.2.1/src/stdio/vsscanf.c:27:12:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(vsscanf,__isoc99_vsscanf);
data/musl-1.2.1/src/stdio/vswprintf.c:37:5:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vswprintf(wchar_t *restrict s, size_t n, const wchar_t *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vswprintf.c:57:6:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	r = vfwprintf(&f, fmt, ap);
data/musl-1.2.1/src/stdio/vswscanf.c:27:5:  [4] (buffer) vswscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vswscanf(const wchar_t *restrict s, const wchar_t *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vswscanf.c:35:9:  [4] (buffer) vfwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	return vfwscanf(&f, fmt, ap);
data/musl-1.2.1/src/stdio/vswscanf.c:38:12:  [4] (buffer) vswscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(vswscanf,__isoc99_vswscanf);
data/musl-1.2.1/src/stdio/vwprintf.c:4:5:  [4] (format) vwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int vwprintf(const wchar_t *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vwprintf.c:6:9:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vfwprintf(stdout, fmt, ap);
data/musl-1.2.1/src/stdio/vwscanf.c:5:5:  [4] (buffer) vwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int vwscanf(const wchar_t *restrict fmt, va_list ap)
data/musl-1.2.1/src/stdio/vwscanf.c:7:9:  [4] (buffer) vfwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	return vfwscanf(stdin, fmt, ap);
data/musl-1.2.1/src/stdio/vwscanf.c:10:12:  [4] (buffer) vwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(vwscanf,__isoc99_vwscanf);
data/musl-1.2.1/src/stdio/wprintf.c:5:5:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int wprintf(const wchar_t *restrict fmt, ...)
data/musl-1.2.1/src/stdio/wprintf.c:10:8:  [4] (format) vwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vwprintf(fmt, ap);
data/musl-1.2.1/src/stdio/wscanf.c:5:5:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int wscanf(const wchar_t *restrict fmt, ...)
data/musl-1.2.1/src/stdio/wscanf.c:10:8:  [4] (buffer) vwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	ret = vwscanf(fmt, ap);
data/musl-1.2.1/src/stdio/wscanf.c:15:12:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
weak_alias(wscanf,__isoc99_wscanf);
data/musl-1.2.1/src/string/strcat.c:3:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char *strcat(char *restrict dest, const char *restrict src)
data/musl-1.2.1/src/string/strcat.c:5:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dest + strlen(dest), src);
data/musl-1.2.1/src/string/strcpy.c:3:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char *strcpy(char *restrict dest, const char *restrict src)
data/musl-1.2.1/src/string/wcpcpy.c:5:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	return wcscpy(d, s) + wcslen(s);
data/musl-1.2.1/src/string/wcscat.c:3:10:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
wchar_t *wcscat(wchar_t *restrict dest, const wchar_t *restrict src)
data/musl-1.2.1/src/string/wcscat.c:5:2:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	wcscpy(dest + wcslen(dest), src);
data/musl-1.2.1/src/string/wcscpy.c:3:10:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
wchar_t *wcscpy(wchar_t *restrict d, const wchar_t *restrict s)
data/musl-1.2.1/src/temp/mktemp.c:7:7:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
char *mktemp(char *template)
data/musl-1.2.1/src/thread/sem_open.c:72:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (flags == (O_CREAT|O_EXCL) && access(name, F_OK) == 0) {
data/musl-1.2.1/src/unistd/access.c:5:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int access(const char *filename, int amode)
data/musl-1.2.1/src/unistd/getlogin.c:4:7:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
char *getlogin(void)
data/musl-1.2.1/src/unistd/getlogin_r.c:7:18:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
	char *logname = getlogin();
data/musl-1.2.1/src/unistd/getlogin_r.c:10:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(name, logname);
data/musl-1.2.1/include/getopt.h:8:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt(int, char * const [], const char *);
data/musl-1.2.1/include/getopt.h:19:5:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt_long(int, char *const *, const char *, const struct option *, int *);
data/musl-1.2.1/include/stdio.h:129:7:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
char *tmpnam(char *);
data/musl-1.2.1/include/stdio.h:163:7:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
char *tempnam(const char *, const char *);
data/musl-1.2.1/include/stdlib.h:36:6:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void srand (unsigned);
data/musl-1.2.1/include/stdlib.h:51:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (const char *);
data/musl-1.2.1/include/stdlib.h:113:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
char *realpath (const char *__restrict, char *__restrict);
data/musl-1.2.1/include/stdlib.h:114:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long int random (void);
data/musl-1.2.1/include/stdlib.h:115:6:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void srandom (unsigned int);
data/musl-1.2.1/include/stdlib.h:117:7:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
char *setstate (char *);
data/musl-1.2.1/include/stdlib.h:126:8:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
double drand48 (void);
data/musl-1.2.1/include/stdlib.h:127:8:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
double erand48 (unsigned short [3]);
data/musl-1.2.1/include/stdlib.h:128:10:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long int lrand48 (void);
data/musl-1.2.1/include/stdlib.h:129:10:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long int nrand48 (unsigned short [3]);
data/musl-1.2.1/include/stdlib.h:130:6:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long mrand48 (void);
data/musl-1.2.1/include/stdlib.h:131:6:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long jrand48 (unsigned short [3]);
data/musl-1.2.1/include/stdlib.h:133:17:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
unsigned short *seed48 (unsigned short [3]);
data/musl-1.2.1/include/stdlib.h:134:6:  [3] (random) lcong48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void lcong48 (unsigned short [7]);
data/musl-1.2.1/include/unistd.h:122:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt(int, char * const [], const char *);
data/musl-1.2.1/include/unistd.h:162:5:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
int chroot(const char *);
data/musl-1.2.1/ldso/dynlink.c:1713:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		env_path = getenv("LD_LIBRARY_PATH");
data/musl-1.2.1/ldso/dynlink.c:1714:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		env_preload = getenv("LD_PRELOAD");
data/musl-1.2.1/src/env/getenv.c:5:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv(const char *name)
data/musl-1.2.1/src/env/secure_getenv.c:7:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return libc.secure ? NULL : getenv(name);
data/musl-1.2.1/src/env/setenv.c:33:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!overwrite && getenv(var)) return 0;
data/musl-1.2.1/src/linux/chroot.c:5:5:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
int chroot(const char *path)
data/musl-1.2.1/src/locale/catopen.c:37:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (libc.secure || !(path = getenv("NLSPATH"))) {
data/musl-1.2.1/src/locale/catopen.c:41:61:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	lang = oflag ? nl_langinfo(_NL_LOCALE_NAME(LC_MESSAGES)) : getenv("LANG");
data/musl-1.2.1/src/locale/locale_map.c:35:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		(val = getenv("LC_ALL")) && *val ||
data/musl-1.2.1/src/locale/locale_map.c:36:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		(val = getenv(envvars[cat])) && *val ||
data/musl-1.2.1/src/locale/locale_map.c:37:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		(val = getenv("LANG")) && *val ||
data/musl-1.2.1/src/locale/locale_map.c:65:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!libc.secure) path = getenv("MUSL_LOCPATH");
data/musl-1.2.1/src/misc/fmtmsg.c:28:40:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *errstring = MM_NULLSEV, *cmsg = getenv("MSGVERB");
data/musl-1.2.1/src/misc/get_current_dir_name.c:10:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *res = getenv("PWD");
data/musl-1.2.1/src/misc/getopt.c:28:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt(int argc, char * const argv[], const char *optstring)
data/musl-1.2.1/src/misc/getopt.c:105:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
weak_alias(getopt, __posix_getopt);
data/musl-1.2.1/src/misc/getopt_long.c:137:9:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	return getopt(argc, argv, optstring);
data/musl-1.2.1/src/misc/getopt_long.c:140:5:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt_long(int argc, char *const *argv, const char *optstring, const struct option *longopts, int *idx)
data/musl-1.2.1/src/misc/realpath.c:10:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
char *realpath(const char *restrict filename, char *restrict resolved)
data/musl-1.2.1/src/prng/drand48.c:5:8:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
double erand48(unsigned short s[3])
data/musl-1.2.1/src/prng/drand48.c:14:8:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
double drand48(void)
data/musl-1.2.1/src/prng/drand48.c:16:9:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return erand48(__seed48);
data/musl-1.2.1/src/prng/lcong48.c:5:6:  [3] (random) lcong48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void lcong48(unsigned short p[7])
data/musl-1.2.1/src/prng/lrand48.c:5:6:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long nrand48(unsigned short s[3])
data/musl-1.2.1/src/prng/lrand48.c:10:6:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long lrand48(void)
data/musl-1.2.1/src/prng/lrand48.c:12:9:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return nrand48(__seed48);
data/musl-1.2.1/src/prng/mrand48.c:5:6:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long jrand48(unsigned short s[3])
data/musl-1.2.1/src/prng/mrand48.c:10:6:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long mrand48(void)
data/musl-1.2.1/src/prng/mrand48.c:12:9:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return jrand48(__seed48);
data/musl-1.2.1/src/prng/rand.c:6:6:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void srand(unsigned s)
data/musl-1.2.1/src/prng/random.c:65:6:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void srandom(unsigned seed) {
data/musl-1.2.1/src/prng/random.c:95:7:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
char *setstate(char *state) {
data/musl-1.2.1/src/prng/random.c:105:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random(void) {
data/musl-1.2.1/src/prng/seed48.c:5:17:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
unsigned short *seed48(unsigned short *s)
data/musl-1.2.1/src/prng/srand48.c:5:2:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	seed48((unsigned short [3]){ 0x330e, seed, seed>>16 });
data/musl-1.2.1/src/process/execvp.c:11:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *p, *z, *path = getenv("PATH");
data/musl-1.2.1/src/regex/glob.c:203:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *home = *p ? NULL : getenv("HOME");
data/musl-1.2.1/src/stdio/tempnam.c:13:7:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
char *tempnam(const char *dir, const char *pfx)
data/musl-1.2.1/src/stdio/tmpnam.c:12:7:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
char *tmpnam(char *buf)
data/musl-1.2.1/src/time/__tz.c:127:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	s = getenv("TZ");
data/musl-1.2.1/src/time/getdate.c:13:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *datemsk = getenv("DATEMSK");
data/musl-1.2.1/src/unistd/getlogin.c:6:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return getenv("LOGNAME");
data/musl-1.2.1/arch/arm/bits/sem.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/arm/bits/sem.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/arm/bits/user.h:13:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ftype[8];
data/musl-1.2.1/arch/arm/bits/user.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/generic/bits/dirent.h:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d_name[256];
data/musl-1.2.1/arch/generic/bits/sem.h:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/generic/bits/sem.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/i386/bits/sem.h:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/i386/bits/user.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				u_comm[32];
data/musl-1.2.1/arch/m68k/bits/sem.h:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/m68k/bits/signal.h:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sc_fpstate[216];
data/musl-1.2.1/arch/m68k/bits/user.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/microblaze/bits/sem.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/microblaze/bits/sem.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/microblaze/bits/user.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/mips/bits/sem.h:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/mips/bits/sem.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/mips/bits/user.h:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/mips64/bits/user.h:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/mipsn32/bits/sem.h:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/mipsn32/bits/sem.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/mipsn32/bits/user.h:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/or1k/bits/sem.h:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/powerpc/bits/user.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/powerpc64/bits/user.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/s390x/bits/user.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/sh/bits/sem.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/sh/bits/sem.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/sh/bits/user.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_comm[32];
data/musl-1.2.1/arch/x32/bits/sem.h:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long long)-sizeof(short)];
data/musl-1.2.1/arch/x32/bits/user.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				u_comm[32];
data/musl-1.2.1/arch/x86_64/bits/sem.h:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __sem_nsems_pad[sizeof(long)-sizeof(short)];
data/musl-1.2.1/arch/x86_64/bits/user.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				u_comm[32];
data/musl-1.2.1/compat/time32/fstat_time32.c:13:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (!r) memcpy(st32, &st, offsetof(struct stat, st_atim));
data/musl-1.2.1/compat/time32/fstatat_time32.c:13:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (!r) memcpy(st32, &st, offsetof(struct stat, st_atim));
data/musl-1.2.1/compat/time32/futimesat_time32.c:7:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int __futimesat_time32(int dirfd, const char *pathname, const struct timeval32 times32[2])
data/musl-1.2.1/compat/time32/getrusage_time32.c:34:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&usage->ru_maxrss, &ru.ru_maxrss,
data/musl-1.2.1/compat/time32/lstat_time32.c:13:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (!r) memcpy(st32, &st, offsetof(struct stat, st_atim));
data/musl-1.2.1/compat/time32/lutimes_time32.c:7:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int __lutimes_time32(const char *path, const struct timeval32 times32[2])
data/musl-1.2.1/compat/time32/stat_time32.c:13:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (!r) memcpy(st32, &st, offsetof(struct stat, st_atim));
data/musl-1.2.1/compat/time32/utimensat_time32.c:5:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int __utimensat_time32(int fd, const char *path, const struct timespec32 times32[2], int flags)
data/musl-1.2.1/compat/time32/utimes_time32.c:6:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int __utimes_time32(const char *path, const struct timeval32 times32[2])
data/musl-1.2.1/compat/time32/wait3_time32.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&usage->ru_maxrss, &ru.ru_maxrss,
data/musl-1.2.1/compat/time32/wait4_time32.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&usage->ru_maxrss, &ru.ru_maxrss,
data/musl-1.2.1/include/aio.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __dummy4[32-2*sizeof(void *)];
data/musl-1.2.1/include/ar.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_name[16];
data/musl-1.2.1/include/ar.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_date[12];
data/musl-1.2.1/include/ar.h:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_uid[6], ar_gid[6];
data/musl-1.2.1/include/ar.h:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_mode[8];
data/musl-1.2.1/include/ar.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_size[10];
data/musl-1.2.1/include/ar.h:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_fmag[2];
data/musl-1.2.1/include/arpa/nameser.h:42:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char *_sections[ns_s_max];
data/musl-1.2.1/include/arpa/nameser.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[NS_MAXDNAME];
data/musl-1.2.1/include/arpa/nameser.h:124:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[NS_MAXDNAME], alg[NS_MAXDNAME];
data/musl-1.2.1/include/arpa/nameser.h:134:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sig[NS_PACKETSZ];
data/musl-1.2.1/include/arpa/telnet.h:80:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *telopts[NTELOPTS+1] = {
data/musl-1.2.1/include/arpa/tftp.h:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tu_stuff[1];
data/musl-1.2.1/include/arpa/tftp.h:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char th_data[1];
data/musl-1.2.1/include/crypt.h:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __buf[256];
data/musl-1.2.1/include/elf.h:38:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	e_ident[EI_NIDENT];
data/musl-1.2.1/include/elf.h:55:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	e_ident[EI_NIDENT];
data/musl-1.2.1/include/fcntl.h:34:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int open(const char *, int, ...);
data/musl-1.2.1/include/fcntl.h:203:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open64 open
data/musl-1.2.1/include/net/if.h:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ifrn_name[IFNAMSIZ];
data/musl-1.2.1/include/net/if.h:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ifru_slave[IFNAMSIZ];
data/musl-1.2.1/include/net/if.h:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ifru_newname[IFNAMSIZ];
data/musl-1.2.1/include/net/if_arp.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arp_dev[16];
data/musl-1.2.1/include/net/if_arp.h:134:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ha[MAX_ADDR_LEN];
data/musl-1.2.1/include/netinet/in.h:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_opts[40];
data/musl-1.2.1/include/netpacket/packet.h:13:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sll_addr[8];
data/musl-1.2.1/include/netpacket/packet.h:19:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mr_address[8];
data/musl-1.2.1/include/resolv.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *dnsrch[MAXDNSRCH+1];
data/musl-1.2.1/include/resolv.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char defdname[256];
data/musl-1.2.1/include/resolv.h:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[52];
data/musl-1.2.1/include/sched.h:80:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void *memcpy(void *__restrict, const void *__restrict, size_t);
data/musl-1.2.1/include/scsi/sg.h:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sense_buffer[SG_MAX_SENSE];
data/musl-1.2.1/include/search.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char q_data[1];
data/musl-1.2.1/include/signal.h:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char __pad[128 - 2*sizeof(int) - sizeof(long)];
data/musl-1.2.1/include/signal.h:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __pad[56-3*sizeof(long)];
data/musl-1.2.1/include/spawn.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __pad[64-sizeof(void *)];
data/musl-1.2.1/include/stdio.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __opaque[16];
data/musl-1.2.1/include/stdio.h:68:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE *fopen(const char *__restrict, const char *__restrict);
data/musl-1.2.1/include/stdio.h:130:7:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
FILE *tmpfile(void);
data/musl-1.2.1/include/stdio.h:207:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
#define tmpfile64 tmpfile
data/musl-1.2.1/include/stdio.h:208:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen64 fopen
data/musl-1.2.1/include/stdlib.h:21:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
int atoi (const char *);
data/musl-1.2.1/include/stdlib.h:22:6:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
long atol (const char *);
data/musl-1.2.1/include/stdlib.h:102:5:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
int mkstemp (char *);
data/musl-1.2.1/include/stdlib.h:163:19:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
#define mkstemp64 mkstemp
data/musl-1.2.1/include/string.h:25:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void *memcpy (void *__restrict, const void *__restrict, size_t);
data/musl-1.2.1/include/strings.h:17:6:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void bcopy (const void *, void *, size_t);
data/musl-1.2.1/include/stropts.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __fill[8];
data/musl-1.2.1/include/stropts.h:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char l_name[FMNAMESZ + 1];
data/musl-1.2.1/include/sys/acct.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ac_comm[ACCT_COMM+1];
data/musl-1.2.1/include/sys/acct.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ac_pad[10];
data/musl-1.2.1/include/sys/acct.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ac_comm[ACCT_COMM];
data/musl-1.2.1/include/sys/msg.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mtext[1];
data/musl-1.2.1/include/sys/mtio.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reserved[10];
data/musl-1.2.1/include/sys/procfs.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pr_fname[16];
data/musl-1.2.1/include/sys/procfs.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pr_psargs[ELF_PRARGSZ];
data/musl-1.2.1/include/sys/socket.h:369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sa_data[14];
data/musl-1.2.1/include/sys/socket.h:374:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __ss_padding[128-sizeof(long)-sizeof(sa_family_t)];
data/musl-1.2.1/include/sys/stat.h:92:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int utimensat(int, const char *, const struct timespec [2], int);
data/musl-1.2.1/include/sys/sysinfo.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __reserved[256];
data/musl-1.2.1/include/sys/time.h:24:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int utimes (const char *, const struct timeval [2]);
data/musl-1.2.1/include/sys/time.h:32:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int futimesat(int, const char *, const struct timeval [2]);
data/musl-1.2.1/include/sys/time.h:33:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int lutimes(const char *, const struct timeval [2]);
data/musl-1.2.1/include/sys/un.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sun_path[108];
data/musl-1.2.1/include/sys/utsname.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sysname[65];
data/musl-1.2.1/include/sys/utsname.h:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nodename[65];
data/musl-1.2.1/include/sys/utsname.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char release[65];
data/musl-1.2.1/include/sys/utsname.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[65];
data/musl-1.2.1/include/sys/utsname.h:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine[65];
data/musl-1.2.1/include/sys/utsname.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char domainname[65];
data/musl-1.2.1/include/sys/utsname.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __domainname[65];
data/musl-1.2.1/include/time.h:114:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *tzname[2];
data/musl-1.2.1/include/unistd.h:160:7:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
pid_t vfork(void);
data/musl-1.2.1/include/utmp.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ll_line[UT_LINESIZE];
data/musl-1.2.1/include/utmp.h:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ll_host[UT_HOSTSIZE];
data/musl-1.2.1/include/utmpx.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ut_line[32];
data/musl-1.2.1/include/utmpx.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ut_id[4];
data/musl-1.2.1/include/utmpx.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ut_user[32];
data/musl-1.2.1/include/utmpx.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ut_host[256];
data/musl-1.2.1/include/utmpx.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __unused[20];
data/musl-1.2.1/ldso/dynlink.c:425:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reloc_addr, &(size_t){sym_val + addend}, sizeof(size_t));
data/musl-1.2.1/ldso/dynlink.c:435:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reloc_addr, (void *)sym_val, sym->st_size);
data/musl-1.2.1/ldso/dynlink.c:798:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((fd = open(buf, O_RDONLY|O_CLOEXEC))>=0) return fd;
data/musl-1.2.1/ldso/dynlink.c:880:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(d, s, t-s);
data/musl-1.2.1/ldso/dynlink.c:882:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(d, origin, l);
data/musl-1.2.1/ldso/dynlink.c:973:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[2*NAME_MAX+2];
data/musl-1.2.1/ldso/dynlink.c:1025:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(name, O_RDONLY|O_CLOEXEC);
data/musl-1.2.1/ldso/dynlink.c:1058:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char etc_ldso_path[prefix_len + 1
data/musl-1.2.1/ldso/dynlink.c:1063:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				FILE *f = fopen(etc_ldso_path, "rbe");
data/musl-1.2.1/ldso/dynlink.c:1132:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, &temp_dso, sizeof temp_dso);
data/musl-1.2.1/ldso/dynlink.c:1252:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, p->deps, sizeof(*tmp) * (ndeps_all+1));
data/musl-1.2.1/ldso/dynlink.c:1553:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newdtv+i, td->dtv,
data/musl-1.2.1/ldso/dynlink.c:1565:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new, p->tls.image, p->tls.len);
data/musl-1.2.1/ldso/dynlink.c:1743:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    && strncmp((char *)aux[AT_EXECFN], "/proc/", 6))
data/musl-1.2.1/ldso/dynlink.c:1744:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			app.name = (char *)aux[AT_EXECFN];
data/musl-1.2.1/ldso/dynlink.c:1787:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(argv[0], O_RDONLY);
data/musl-1.2.1/ldso/dynlink.c:2251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char redir[36];
data/musl-1.2.1/src/aio/lio_listio.c:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(st->cbs, (void*) cbs, cnt*sizeof *cbs);
data/musl-1.2.1/src/conf/sysconf.c:198:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char set[128] = {1};
data/musl-1.2.1/src/crypt/crypt.c:12:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[128];
data/musl-1.2.1/src/crypt/crypt_blowfish.c:353:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char BF_itoa64[64 + 1] =
data/musl-1.2.1/src/crypt/crypt_blowfish.c:356:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char BF_atoi64[0x60] = {
data/musl-1.2.1/src/crypt/crypt_blowfish.c:602:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char flags_by_subtype[26] =
data/musl-1.2.1/src/crypt/crypt_blowfish.c:712:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(output, setting, 7 + 22 - 1);
data/musl-1.2.1/src/crypt/crypt_blowfish.c:749:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char test_hash[2][34] =
data/musl-1.2.1/src/crypt/crypt_blowfish.c:756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[7 + 22 + 1];
data/musl-1.2.1/src/crypt/crypt_blowfish.c:757:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char o[7 + 22 + 31 + 1 + 1 + 1];
data/musl-1.2.1/src/crypt/crypt_des.c:63:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char key_shifts[16] = {
data/musl-1.2.1/src/crypt/crypt_des.c:880:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char keybuf[8];
data/musl-1.2.1/src/crypt/crypt_des.c:933:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(output, setting, 9);
data/musl-1.2.1/src/crypt/crypt_des.c:990:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_buf[21];
data/musl-1.2.1/src/crypt/crypt_md5.c:142:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s->buf + r, p, len);
data/musl-1.2.1/src/crypt/crypt_md5.c:145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s->buf + r, p, 64 - r);
data/musl-1.2.1/src/crypt/crypt_md5.c:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->buf, p, len);
data/musl-1.2.1/src/crypt/crypt_md5.c:200:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md[16];
data/musl-1.2.1/src/crypt/crypt_md5.c:258:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(output, setting, 3 + slen);
data/musl-1.2.1/src/crypt/crypt_md5.c:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char testbuf[64];
data/musl-1.2.1/src/crypt/crypt_sha256.c:143:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s->buf + r, p, len);
data/musl-1.2.1/src/crypt/crypt_sha256.c:146:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s->buf + r, p, 64 - r);
data/musl-1.2.1/src/crypt/crypt_sha256.c:153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->buf, p, len);
data/musl-1.2.1/src/crypt/crypt_sha256.c:190:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md[32], kmd[32], smd[32];
data/musl-1.2.1/src/crypt/crypt_sha256.c:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rounds[20] = "";
data/musl-1.2.1/src/crypt/crypt_sha256.c:237:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(rounds, "rounds=%u$", r);
data/musl-1.2.1/src/crypt/crypt_sha256.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char testbuf[128];
data/musl-1.2.1/src/crypt/crypt_sha512.c:164:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s->buf + r, p, len);
data/musl-1.2.1/src/crypt/crypt_sha512.c:167:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s->buf + r, p, 128 - r);
data/musl-1.2.1/src/crypt/crypt_sha512.c:174:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->buf, p, len);
data/musl-1.2.1/src/crypt/crypt_sha512.c:211:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md[64], kmd[64], smd[64];
data/musl-1.2.1/src/crypt/crypt_sha512.c:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rounds[20] = "";
data/musl-1.2.1/src/crypt/crypt_sha512.c:259:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(rounds, "rounds=%u$", r);
data/musl-1.2.1/src/crypt/crypt_sha512.c:362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char testbuf[128];
data/musl-1.2.1/src/crypt/encrypt.c:11:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bkey[8];
data/musl-1.2.1/src/ctype/towctrans.c:5:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char rulebases[512];
data/musl-1.2.1/src/dirent/__dirent.h:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[2048];
data/musl-1.2.1/src/dirent/opendir.c:13:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(name, O_RDONLY|O_DIRECTORY|O_CLOEXEC)) < 0)
data/musl-1.2.1/src/dirent/readdir.c:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char dirstream_buf_alignment_check[1-2*(int)(
data/musl-1.2.1/src/dirent/readdir_r.c:21:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (de) memcpy(buf, de, de->d_reclen);
data/musl-1.2.1/src/dirent/scandir.c:30:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(names[cnt++], de, de->d_reclen);
data/musl-1.2.1/src/env/__init_tls.c:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mem + p->offset, p->image, p->len);
data/musl-1.2.1/src/env/__init_tls.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mem - p->offset, p->image, p->len);
data/musl-1.2.1/src/env/__reset_tls.c:12:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mem, p->image, p->len);
data/musl-1.2.1/src/env/__stack_chk_fail.c:9:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (entropy) memcpy(&__stack_chk_guard, entropy, sizeof(uintptr_t));
data/musl-1.2.1/src/env/putenv.c:28:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		if (i) memcpy(newenv, __environ, sizeof *newenv * i);
data/musl-1.2.1/src/env/setenv.c:38:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s, var, l1);
data/musl-1.2.1/src/env/setenv.c:40:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s+l1+1, value, l2+1);
data/musl-1.2.1/src/fcntl/creat.c:5:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open(filename, O_CREAT|O_WRONLY|O_TRUNC, mode);
data/musl-1.2.1/src/fcntl/open.c:5:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int open(const char *filename, int flags, ...)
data/musl-1.2.1/src/fcntl/open.c:23:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
weak_alias(open, open64);
data/musl-1.2.1/src/include/sys/time.h:6:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
hidden int __futimesat(int, const char *, const struct timeval [2]);
data/musl-1.2.1/src/internal/atomic.h:229:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char a_cas_p_undefined_but_pointer_not_32bit[-sizeof(char) == 0xffffffff ? 1 : -1];
data/musl-1.2.1/src/internal/atomic.h:261:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char debruijn32[32] = {
data/musl-1.2.1/src/internal/atomic.h:274:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char debruijn64[64] = {
data/musl-1.2.1/src/internal/locale_impl.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[LOCALE_NAME_MAX+1];
data/musl-1.2.1/src/internal/syscall.h:380:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
hidden void __procfdname(char __buf[static 15+3*sizeof(int)], unsigned);
data/musl-1.2.1/src/legacy/daemon.c:11:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fd = open("/dev/null", O_RDWR)) < 0) return -1;
data/musl-1.2.1/src/legacy/getpass.c:13:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char password[128];
data/musl-1.2.1/src/legacy/getpass.c:15:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open("/dev/tty", O_RDWR|O_NOCTTY|O_CLOEXEC)) < 0) return 0;
data/musl-1.2.1/src/legacy/getusershell.c:19:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!f) f = fopen("/etc/shells", "rbe");
data/musl-1.2.1/src/legacy/lutimes.c:6:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int lutimes(const char *filename, const struct timeval tv[2])
data/musl-1.2.1/src/linux/utimes.c:5:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int utimes(const char *path, const struct timeval times[2])
data/musl-1.2.1/src/linux/wait4.c:32:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(kru, dest, 4*sizeof(long));
data/musl-1.2.1/src/locale/__mo_lookup.c:23:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if (os >= size || ol >= size-os || ((char *)p)[os+ol])
data/musl-1.2.1/src/locale/__mo_lookup.c:29:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			if (ts >= size || tl >= size-ts || ((char *)p)[ts+tl])
data/musl-1.2.1/src/locale/catopen.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/musl-1.2.1/src/locale/catopen.c:66:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf+i, v, l);
data/musl-1.2.1/src/locale/dcngettext.c:71:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p->domainname, domainname, domlen+1);
data/musl-1.2.1/src/locale/dcngettext.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p->dirname, dirname, dirlen+1);
data/musl-1.2.1/src/locale/dcngettext.c:174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[dirlen+1 + loclen+modlen+1 + catlen+1 + domlen+3 + 1];
data/musl-1.2.1/src/locale/iconv.c:462:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char c[8];
data/musl-1.2.1/src/locale/iconv.c:463:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t wc[2];
data/musl-1.2.1/src/locale/iconv.c:476:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(*out, &tmp, tmplen);
data/musl-1.2.1/src/locale/iconv.c:536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[4];
data/musl-1.2.1/src/locale/iconv.c:539:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(*out, tmp, k);
data/musl-1.2.1/src/locale/locale_map.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/musl-1.2.1/src/locale/locale_map.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, path, l);
data/musl-1.2.1/src/locale/locale_map.c:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf+l+1, val, n);
data/musl-1.2.1/src/locale/locale_map.c:86:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new->name, val, n);
data/musl-1.2.1/src/locale/locale_map.c:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new->name, val, n);
data/musl-1.2.1/src/locale/pleval.c:90:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char opch[11] = "|&=!><+-*%/";
data/musl-1.2.1/src/locale/pleval.c:91:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char opch2[6] = "|&====";
data/musl-1.2.1/src/locale/pleval.c:112:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char prec[14] = {1,2,3,3,4,4,4,4,5,5,6,6,6,0};
data/musl-1.2.1/src/locale/setlocale.c:8:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[LC_ALL*(LOCALE_NAME_MAX+1)];
data/musl-1.2.1/src/locale/setlocale.c:28:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char part[LOCALE_NAME_MAX+1] = "C.UTF-8";
data/musl-1.2.1/src/locale/setlocale.c:33:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(part, p, z-p);
data/musl-1.2.1/src/locale/setlocale.c:55:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s, part, l);
data/musl-1.2.1/src/locale/textdomain.c:29:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(current_domain, domainname, domlen+1);
data/musl-1.2.1/src/malloc/mallocng/free.c:112:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((unsigned char *)p)[-3] = 255;
data/musl-1.2.1/src/malloc/mallocng/glue.h:43:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&secret, (char *)libc.auxv[i+1]+8, sizeof secret);
data/musl-1.2.1/src/malloc/mallocng/meta.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad[UNIT - sizeof(struct meta *) - 1];
data/musl-1.2.1/src/malloc/mallocng/realloc.c:48:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new, p, n < old_size ? n : old_size);
data/musl-1.2.1/src/malloc/oldmalloc/malloc.c:59:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char debruijn64[64] = {
data/musl-1.2.1/src/malloc/oldmalloc/malloc.c:65:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char debruijn32[32] = {
data/musl-1.2.1/src/malloc/oldmalloc/malloc.c:81:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char bin_tab[60] = {
data/musl-1.2.1/src/malloc/oldmalloc/malloc.c:424:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new, p, (n<n0 ? n : n0) - OVERHEAD);
data/musl-1.2.1/src/misc/a64l.c:22:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char s[7];
data/musl-1.2.1/src/misc/fmtmsg.c:42:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		consolefd = open("/dev/console", O_WRONLY);
data/musl-1.2.1/src/misc/getrusage.c:28:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(kru, dest, 4*sizeof(long));
data/musl-1.2.1/src/misc/ioctl.c:19:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char offsets[8];
data/musl-1.2.1/src/misc/ioctl.c:29:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define new_misaligned(n) struct { int i; time_t t; char c[(n)-4]; }
data/musl-1.2.1/src/misc/ioctl.c:91:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		if (dir==W) memcpy(old+old_offset, new+new_offset, len);
data/musl-1.2.1/src/misc/ioctl.c:92:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		else memcpy(new+new_offset, old+old_offset, len);
data/musl-1.2.1/src/misc/ioctl.c:100:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&new_ts, new+new_offset, sizeof new_ts);
data/musl-1.2.1/src/misc/ioctl.c:102:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(old+old_offset, &old_ts, sizeof old_ts);
data/musl-1.2.1/src/misc/ioctl.c:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&old_ts, old+old_offset, sizeof old_ts);
data/musl-1.2.1/src/misc/ioctl.c:106:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new+new_offset, &new_ts, sizeof new_ts);
data/musl-1.2.1/src/misc/ioctl.c:111:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (dir==W) memcpy(old+old_offset, new+new_offset, old_size-old_offset);
data/musl-1.2.1/src/misc/ioctl.c:112:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	else memcpy(new+new_offset, old+old_offset, old_size-old_offset);
data/musl-1.2.1/src/misc/ioctl.c:128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[256];
data/musl-1.2.1/src/misc/mntent.c:13:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return fopen(name, mode);
data/musl-1.2.1/src/misc/nftw.c:69:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dfd = open(path, O_RDONLY);
data/musl-1.2.1/src/misc/nftw.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pathbuf[PATH_MAX+1];
data/musl-1.2.1/src/misc/nftw.c:134:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pathbuf, path, l+1);
data/musl-1.2.1/src/misc/openpty.c:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[20];
data/musl-1.2.1/src/misc/openpty.c:15:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	m = open("/dev/ptmx", O_RDWR|O_NOCTTY);
data/musl-1.2.1/src/misc/openpty.c:25:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((s = open(name, O_RDWR|O_NOCTTY)) < 0)
data/musl-1.2.1/src/misc/ptsname.c:6:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[9 + sizeof(int)*3 + 1];
data/musl-1.2.1/src/misc/pty.c:10:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int r = open("/dev/ptmx", flags);
data/musl-1.2.1/src/misc/realpath.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[15+3*sizeof(int)];
data/musl-1.2.1/src/misc/realpath.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX];
data/musl-1.2.1/src/misc/syslog.c:15:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char log_ident[32];
data/musl-1.2.1/src/misc/syslog.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sun_path[9];
data/musl-1.2.1/src/misc/syslog.c:63:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(log_ident, ident, n);
data/musl-1.2.1/src/misc/syslog.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timebuf[16];
data/musl-1.2.1/src/misc/syslog.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/musl-1.2.1/src/misc/syslog.c:115:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open("/dev/console", O_WRONLY|O_NOCTTY|O_CLOEXEC);
data/musl-1.2.1/src/mman/shm_open.c:22:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, "/dev/shm/", 9);
data/musl-1.2.1/src/mman/shm_open.c:23:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf+9, name, p-name+1);
data/musl-1.2.1/src/mman/shm_open.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[NAME_MAX+10];
data/musl-1.2.1/src/mman/shm_open.c:33:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(name, flag|O_NOFOLLOW|O_CLOEXEC|O_NONBLOCK, mode);
data/musl-1.2.1/src/mman/shm_open.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[NAME_MAX+10];
data/musl-1.2.1/src/mq/mq_notify.c:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/musl-1.2.1/src/mq/mq_notify.c:39:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char zeros[32];
data/musl-1.2.1/src/multibyte/mbsnrtowcs.c:6:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t *ws, wbuf[256];
data/musl-1.2.1/src/multibyte/wcsnrtombs.c:6:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, buf[256];
data/musl-1.2.1/src/multibyte/wcsrtombs.c:6:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4];
data/musl-1.2.1/src/network/dn_comp.c:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char lens[127];
data/musl-1.2.1/src/network/dn_comp.c:87:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst+1, src, l-bestlen);
data/musl-1.2.1/src/network/ether.c:41:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char x[18];
data/musl-1.2.1/src/network/getaddrinfo.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char canon[256], *outcanon;
data/musl-1.2.1/src/network/getaddrinfo.c:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(outcanon, canon, canon_len+1);
data/musl-1.2.1/src/network/getaddrinfo.c:122:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&out[k].sa.sin.sin_addr, &addrs[i].addr, 4);
data/musl-1.2.1/src/network/getaddrinfo.c:128:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&out[k].sa.sin6.sin6_addr, &addrs[i].addr, 16);
data/musl-1.2.1/src/network/gethostbyaddr_r.c:24:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (af==AF_INET6 && l==16) memcpy(&sa.sin6.sin6_addr, a, 16);
data/musl-1.2.1/src/network/gethostbyaddr_r.c:25:32:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	else if (af==AF_INET && l==4) memcpy(&sa.sin.sin_addr, a, 4);
data/musl-1.2.1/src/network/gethostbyaddr_r.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(h->h_addr_list[0], a, l);
data/musl-1.2.1/src/network/gethostbyname2_r.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char canon[256];
data/musl-1.2.1/src/network/gethostbyname2_r.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(h->h_addr_list[i], addrs[i].addr, h->h_length);
data/musl-1.2.1/src/network/getifaddrs.c:23:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sll_addr[24];
data/musl-1.2.1/src/network/getifaddrs.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IFNAMSIZ+1];
data/musl-1.2.1/src/network/getifaddrs.c:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, addr, len);
data/musl-1.2.1/src/network/getifaddrs.c:101:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sa->ll.sll_addr, addr, addrlen);
data/musl-1.2.1/src/network/getifaddrs.c:138:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ifs->name, RTA_DATA(rta), RTA_DATALEN(rta));
data/musl-1.2.1/src/network/getifaddrs.c:150:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ifs->ifa.ifa_data, RTA_DATA(rta), RTA_DATALEN(rta));
data/musl-1.2.1/src/network/getifaddrs.c:187:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ifs->name, RTA_DATA(rta), RTA_DATALEN(rta));
data/musl-1.2.1/src/network/getnameinfo.c:30:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(s, "%d.%d.%d.%d.in-addr.arpa",
data/musl-1.2.1/src/network/getnameinfo.c:42:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "ip6.arpa");
data/musl-1.2.1/src/network/getnameinfo.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[512], *p, *z;
data/musl-1.2.1/src/network/getnameinfo.c:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _buf[1032], atmp[16];
data/musl-1.2.1/src/network/getnameinfo.c:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(atmp+12, a, 4);
data/musl-1.2.1/src/network/getnameinfo.c:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(atmp, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
data/musl-1.2.1/src/network/getnameinfo.c:66:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iplit.addr+12, iplit.addr, 4);
data/musl-1.2.1/src/network/getnameinfo.c:67:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iplit.addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
data/musl-1.2.1/src/network/getnameinfo.c:78:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, p, z-p+1);
data/musl-1.2.1/src/network/getnameinfo.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[128], *p, *z;
data/musl-1.2.1/src/network/getnameinfo.c:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _buf[1032];
data/musl-1.2.1/src/network/getnameinfo.c:105:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, line, p-line);
data/musl-1.2.1/src/network/getnameinfo.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ptr[PTR_MAX];
data/musl-1.2.1/src/network/getnameinfo.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256], num[3*sizeof(int)+1];
data/musl-1.2.1/src/network/getnameinfo.c:158:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char query[18+PTR_MAX], reply[512];
data/musl-1.2.1/src/network/getservbyname.c:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *buf[2];
data/musl-1.2.1/src/network/if_nameindex.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IFNAMSIZ];
data/musl-1.2.1/src/network/if_nameindex.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(map->name, RTA_DATA(rta), namelen);
data/musl-1.2.1/src/network/if_nameindex.c:103:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, s->name, s->namelen);
data/musl-1.2.1/src/network/inet_ntoa.c:6:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[16];
data/musl-1.2.1/src/network/inet_ntop.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/musl-1.2.1/src/network/lookup.h:47:63:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
hidden int __lookup_name(struct address buf[static MAXADDRS], char canon[static 256], const char *name, int family, int flags);
data/musl-1.2.1/src/network/lookup_ipliteral.c:19:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&buf[0].addr, &a4, sizeof a4);
data/musl-1.2.1/src/network/lookup_ipliteral.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/musl-1.2.1/src/network/lookup_ipliteral.c:29:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, name, p-name);
data/musl-1.2.1/src/network/lookup_ipliteral.c:39:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&buf[0].addr, &a6, sizeof a6);
data/musl-1.2.1/src/network/lookup_name.c:49:65:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int name_from_hosts(struct address buf[static MAXADDRS], char canon[static 256], const char *name, int family)
data/musl-1.2.1/src/network/lookup_name.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[512];
data/musl-1.2.1/src/network/lookup_name.c:54:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _buf[1032];
data/musl-1.2.1/src/network/lookup_name.c:90:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		if (is_valid_hostname(p)) memcpy(canon, p, z-p+1);
data/musl-1.2.1/src/network/lookup_name.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/musl-1.2.1/src/network/lookup_name.c:116:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->addrs[ctx->cnt++].addr, data, 4);
data/musl-1.2.1/src/network/lookup_name.c:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->addrs[ctx->cnt++].addr, data, 16);
data/musl-1.2.1/src/network/lookup_name.c:133:63:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int name_from_dns(struct address buf[static MAXADDRS], char canon[static 256], const char *name, int family, const struct resolvconf *conf)
data/musl-1.2.1/src/network/lookup_name.c:135:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char qbuf[2][280], abuf[2][512];
data/musl-1.2.1/src/network/lookup_name.c:136:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char *qp[2] = { qbuf[0], qbuf[1] };
data/musl-1.2.1/src/network/lookup_name.c:137:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *ap[2] = { abuf[0], abuf[1] };
data/musl-1.2.1/src/network/lookup_name.c:173:70:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int name_from_dns_search(struct address buf[static MAXADDRS], char canon[static 256], const char *name, int family)
data/musl-1.2.1/src/network/lookup_name.c:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char search[256];
data/musl-1.2.1/src/network/lookup_name.c:198:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(canon, name, l);
data/musl-1.2.1/src/network/lookup_name.c:206:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(canon+l+1, p, z-p);
data/musl-1.2.1/src/network/lookup_name.c:218:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char addr[16];
data/musl-1.2.1/src/network/lookup_name.c:291:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int __lookup_name(struct address buf[static MAXADDRS], char canon[static 256], const char *name, int family, int flags)
data/musl-1.2.1/src/network/lookup_name.c:301:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(canon, name, l+1);
data/musl-1.2.1/src/network/lookup_name.c:337:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf[i].addr+12, buf[i].addr, 4);
data/musl-1.2.1/src/network/lookup_name.c:338:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf[i].addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
data/musl-1.2.1/src/network/lookup_name.c:372:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(da6.sin6_addr.s6_addr, buf[i].addr, 16);
data/musl-1.2.1/src/network/lookup_name.c:376:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sa6.sin6_addr.s6_addr,
data/musl-1.2.1/src/network/lookup_name.c:378:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(da6.sin6_addr.s6_addr+12, buf[i].addr, 4);
data/musl-1.2.1/src/network/lookup_name.c:379:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(da6.sin6_addr.s6_addr,
data/musl-1.2.1/src/network/lookup_name.c:381:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(da6.sin6_addr.s6_addr+12, buf[i].addr, 4);
data/musl-1.2.1/src/network/lookup_name.c:382:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&da4.sin_addr, buf[i].addr, 4);
data/musl-1.2.1/src/network/lookup_name.c:396:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					if (family == AF_INET) memcpy(
data/musl-1.2.1/src/network/lookup_serv.c:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[128];
data/musl-1.2.1/src/network/lookup_serv.c:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _buf[1032];
data/musl-1.2.1/src/network/recvmsg.c:29:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&tmp, CMSG_DATA(cmsg), sizeof tmp);
data/musl-1.2.1/src/network/recvmsg.c:31:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&tmp, CMSG_DATA(cmsg) + sizeof tmp, sizeof tmp);
data/musl-1.2.1/src/network/recvmsg.c:47:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(CMSG_DATA(cmsg), &tvts, sizeof tvts);
data/musl-1.2.1/src/network/res_mkquery.c:10:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char q[280];
data/musl-1.2.1/src/network/res_mkquery.c:25:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)q+13, dname, l);
data/musl-1.2.1/src/network/res_mkquery.c:40:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, q, n);
data/musl-1.2.1/src/network/res_msend.c:58:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ns[nns].sin.sin_addr, iplit->addr, 4);
data/musl-1.2.1/src/network/res_msend.c:63:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ns[nns].sin6.sin6_addr, iplit->addr, 16);
data/musl-1.2.1/src/network/res_msend.c:97:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ns[i].sin6.sin6_addr.s6_addr+12,
data/musl-1.2.1/src/network/res_msend.c:99:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ns[i].sin6.sin6_addr.s6_addr,
data/musl-1.2.1/src/network/res_msend.c:171:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(answers[i], answers[next], rlen);
data/musl-1.2.1/src/network/res_query.c:6:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char q[280];
data/musl-1.2.1/src/network/res_querydomain.c:6:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[255];
data/musl-1.2.1/src/network/res_querydomain.c:10:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, name, nl);
data/musl-1.2.1/src/network/res_querydomain.c:12:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp+nl+1, domain, dl+1);
data/musl-1.2.1/src/network/resolvconf.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/musl-1.2.1/src/network/resolvconf.c:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _buf[256];
data/musl-1.2.1/src/network/resolvconf.c:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(search, p, l+1);
data/musl-1.2.1/src/network/sendmsg.c:21:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(chbuf, h.msg_control, h.msg_controllen);
data/musl-1.2.1/src/passwd/getgr_a.c:29:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("/etc/group", "rbe");
data/musl-1.2.1/src/passwd/getgr_a.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char gidbuf[11] = {0};
data/musl-1.2.1/src/passwd/getgr_r.c:27:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, line, len);
data/musl-1.2.1/src/passwd/getgrent.c:19:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!f) f = fopen("/etc/group", "rbe");
data/musl-1.2.1/src/passwd/getgrouplist.c:45:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("/etc/group", "rbe");
data/musl-1.2.1/src/passwd/getpw_a.c:30:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("/etc/passwd", "rbe");
data/musl-1.2.1/src/passwd/getpw_a.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char uidbuf[11] = {0};
data/musl-1.2.1/src/passwd/getpw_r.c:21:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, line, len);
data/musl-1.2.1/src/passwd/getpwent.c:19:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!f) f = fopen("/etc/passwd", "rbe");
data/musl-1.2.1/src/passwd/getspnam_r.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[20+NAME_MAX];
data/musl-1.2.1/src/passwd/getspnam_r.c:86:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY|O_NOFOLLOW|O_NONBLOCK|O_CLOEXEC);
data/musl-1.2.1/src/passwd/getspnam_r.c:99:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen("/etc/shadow", "rbe");
data/musl-1.2.1/src/passwd/nscd_query.c:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sun_path[21];
data/musl-1.2.1/src/prng/lcong48.c:7:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(__seed48, p, sizeof __seed48);
data/musl-1.2.1/src/prng/seed48.c:8:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, __seed48, sizeof p);
data/musl-1.2.1/src/prng/seed48.c:9:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(__seed48, s, sizeof p);
data/musl-1.2.1/src/process/execl.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *argv[argc+1];
data/musl-1.2.1/src/process/execle.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *argv[argc+1];
data/musl-1.2.1/src/process/execlp.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *argv[argc+1];
data/musl-1.2.1/src/process/execvp.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char b[l+k+1];
data/musl-1.2.1/src/process/execvp.c:36:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(b, p, z-p);
data/musl-1.2.1/src/process/execvp.c:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(b+(z-p)+(z>p), file, k+1);
data/musl-1.2.1/src/process/fexecve.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[15 + 3*sizeof(int)];
data/musl-1.2.1/src/process/posix_spawn.c:163:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int posix_spawn(pid_t *restrict res, const char *restrict path,
data/musl-1.2.1/src/process/posix_spawn.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *const argv[restrict], char *const envp[restrict])
data/musl-1.2.1/src/process/posix_spawn.c:166:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *const argv[restrict], char *const envp[restrict])
data/musl-1.2.1/src/process/posix_spawn.c:169:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char stack[1024+PATH_MAX];
data/musl-1.2.1/src/process/posix_spawnp.c:4:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int posix_spawnp(pid_t *restrict res, const char *restrict file,
data/musl-1.2.1/src/process/posix_spawnp.c:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *const argv[restrict], char *const envp[restrict])
data/musl-1.2.1/src/process/posix_spawnp.c:7:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *const argv[restrict], char *const envp[restrict])
data/musl-1.2.1/src/process/vfork.c:6:7:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
pid_t vfork(void)
data/musl-1.2.1/src/regex/fnmatch.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[16];
data/musl-1.2.1/src/regex/fnmatch.c:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buf, p0, p-1-p0);
data/musl-1.2.1/src/regex/glob.c:26:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new->name, name, len+1);
data/musl-1.2.1/src/regex/glob.c:158:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf+pos, de->d_name, l+1);
data/musl-1.2.1/src/regex/glob.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/musl-1.2.1/src/regex/regcomp.c:556:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[CHARCLASS_NAME_MAX+1];
data/musl-1.2.1/src/regex/regcomp.c:560:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tmp, s, len);
data/musl-1.2.1/src/regex/regcomp.c:671:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(nc, neg.a, neg.len*sizeof *neg.a);
data/musl-1.2.1/src/regex/regcomp.c:2869:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(initial[i].tags, p->tags, sizeof(*p->tags) * (j + 1));
data/musl-1.2.1/src/regex/regexec.c:996:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
regexec(const regex_t *restrict preg, const char *restrict string,
data/musl-1.2.1/src/search/lsearch.c:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char (*p)[width] = base;
data/musl-1.2.1/src/search/lsearch.c:15:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(p[n], key, width);
data/musl-1.2.1/src/search/lsearch.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char (*p)[width] = (void *)base;
data/musl-1.2.1/src/signal/sigaction.c:21:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(set, handler_set, sizeof handler_set);
data/musl-1.2.1/src/signal/sigaction.c:64:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ksa.mask, &sa->sa_mask, _NSIG/8);
data/musl-1.2.1/src/signal/sigaction.c:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&old->sa_mask, &ksa_old.mask, _NSIG/8);
data/musl-1.2.1/src/stat/fchmod.c:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[15+3*sizeof(int)];
data/musl-1.2.1/src/stat/fchmodat.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char proc[15+3*sizeof(int)];
data/musl-1.2.1/src/stat/fstatat.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[15+3*sizeof(int)];
data/musl-1.2.1/src/stat/futimesat.c:7:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int __futimesat(int dirfd, const char *pathname, const struct timeval times[2])
data/musl-1.2.1/src/stat/utimensat.c:10:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int utimensat(int fd, const char *path, const struct timespec times[2], int flags)
data/musl-1.2.1/src/stdio/__stdio_write.c:31:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		iov[0].iov_base = (char *)iov[0].iov_base + cnt;
data/musl-1.2.1/src/stdio/fgets.c:28:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, f->rpos, k);
data/musl-1.2.1/src/stdio/fmemopen.c:18:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[UNGET+BUFSIZ], buf2[];
data/musl-1.2.1/src/stdio/fmemopen.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, c->buf+c->pos, len);
data/musl-1.2.1/src/stdio/fmemopen.c:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(f->rpos, c->buf+c->pos, rem);
data/musl-1.2.1/src/stdio/fmemopen.c:67:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->buf+c->pos, buf, len);
data/musl-1.2.1/src/stdio/fopen.c:6:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE *fopen(const char *restrict filename, const char *restrict mode)
data/musl-1.2.1/src/stdio/fopen.c:33:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
weak_alias(fopen, fopen64);
data/musl-1.2.1/src/stdio/fopencookie.c:17:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[UNGET+BUFSIZ];
data/musl-1.2.1/src/stdio/fputwc.c:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mbc[MB_LEN_MAX];
data/musl-1.2.1/src/stdio/fputws.c:7:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[BUFSIZ];
data/musl-1.2.1/src/stdio/fread.c:19:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dest, f->rpos, k);
data/musl-1.2.1/src/stdio/freopen.c:29:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f2 = fopen(filename, mode);
data/musl-1.2.1/src/stdio/fwrite.c:23:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(f->wpos, s, l);
data/musl-1.2.1/src/stdio/getdelim.c:46:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(*s+i, f->rpos, k);
data/musl-1.2.1/src/stdio/getdelim.c:58:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*s+i, f->rpos, k);
data/musl-1.2.1/src/stdio/open_memstream.c:20:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[BUFSIZ];
data/musl-1.2.1/src/stdio/open_memstream.c:54:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->buf+c->pos, buf, len);
data/musl-1.2.1/src/stdio/open_wmemstream.c:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1];
data/musl-1.2.1/src/stdio/stderr.c:5:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char buf[UNGET];
data/musl-1.2.1/src/stdio/stdin.c:5:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char buf[BUFSIZ+UNGET];
data/musl-1.2.1/src/stdio/stdout.c:5:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char buf[BUFSIZ+UNGET];
data/musl-1.2.1/src/stdio/tempnam.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[PATH_MAX];
data/musl-1.2.1/src/stdio/tempnam.c:32:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s, dir, dl);
data/musl-1.2.1/src/stdio/tempnam.c:34:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s+dl+1, pfx, pl);
data/musl-1.2.1/src/stdio/tmpfile.c:8:7:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
FILE *tmpfile(void)
data/musl-1.2.1/src/stdio/tmpfile.c:31:12:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
weak_alias(tmpfile, tmpfile64);
data/musl-1.2.1/src/stdio/tmpnam.c:14:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char internal[L_tmpnam];
data/musl-1.2.1/src/stdio/ungetwc.c:10:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mbc[MB_LEN_MAX];
data/musl-1.2.1/src/stdio/ungetwc.c:28:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	else memcpy(f->rpos -= l, mbc, l);
data/musl-1.2.1/src/stdio/vfprintf.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad[256];
data/musl-1.2.1/src/stdio/vfprintf.c:149:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char xdigits[16] = {
data/musl-1.2.1/src/stdio/vfprintf.c:177:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char compiler_defines_long_double_incorrectly[9-(int)sizeof(long double)];
data/musl-1.2.1/src/stdio/vfprintf.c:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[9+LDBL_MANT_DIG/4], *s;
data/musl-1.2.1/src/stdio/vfprintf.c:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ebuf0[3*sizeof(int)], *ebuf=&ebuf0[3*sizeof(int)], *estr;
data/musl-1.2.1/src/stdio/vfprintf.c:440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(uintmax_t)*3+3+LDBL_MANT_DIG/4];
data/musl-1.2.1/src/stdio/vfprintf.c:443:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wc[2], *ws;
data/musl-1.2.1/src/stdio/vfprintf.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mb[4];
data/musl-1.2.1/src/stdio/vfprintf.c:662:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char internal_buf[80], *saved_buf = 0;
data/musl-1.2.1/src/stdio/vfscanf.c:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char scanset[257];
data/musl-1.2.1/src/stdio/vfwprintf.c:140:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char sizeprefix['y'-'a'] = {
data/musl-1.2.1/src/stdio/vfwprintf.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char charfmt[16];
data/musl-1.2.1/src/stdio/vfwscanf.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[3*sizeof(int)+10];
data/musl-1.2.1/src/stdio/vsnprintf.c:19:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(c->s, f->wbase, k);
data/musl-1.2.1/src/stdio/vsnprintf.c:25:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(c->s, s, k);
data/musl-1.2.1/src/stdio/vsnprintf.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1];
data/musl-1.2.1/src/stdio/vsnprintf.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dummy[1];
data/musl-1.2.1/src/stdio/vsscanf.c:11:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, src, len);
data/musl-1.2.1/src/stdio/vswprintf.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[256];
data/musl-1.2.1/src/stdio/vswscanf.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[256];
data/musl-1.2.1/src/stdlib/atoi.c:4:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
int atoi(const char *s)
data/musl-1.2.1/src/stdlib/atol.c:4:6:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
long atol(const char *s)
data/musl-1.2.1/src/stdlib/ecvt.c:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[16];
data/musl-1.2.1/src/stdlib/ecvt.c:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/musl-1.2.1/src/stdlib/ecvt.c:12:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%.*e", n-1, x);
data/musl-1.2.1/src/stdlib/ecvt.c:17:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*dp = atoi(tmp+i+1)+1;
data/musl-1.2.1/src/stdlib/fcvt.c:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1500];
data/musl-1.2.1/src/stdlib/fcvt.c:12:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%.*f", n, x);
data/musl-1.2.1/src/stdlib/gcvt.c:7:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(b, "%.*g", n, x);
data/musl-1.2.1/src/stdlib/qsort.c:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tmp[256];
data/musl-1.2.1/src/stdlib/qsort.c:57:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ar[n], ar[0], l);
data/musl-1.2.1/src/stdlib/qsort.c:59:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ar[i], ar[i + 1], l);
data/musl-1.2.1/src/stdlib/qsort.c:94:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *ar[14 * sizeof(size_t) + 1];
data/musl-1.2.1/src/stdlib/qsort.c:118:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void trinkle(unsigned char *head, size_t width, cmpfun cmp, size_t pp[2], int pshift, int trusty, size_t lp[])
data/musl-1.2.1/src/stdlib/qsort.c:123:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *ar[14 * sizeof(size_t) + 1];
data/musl-1.2.1/src/stdlib/wcstod.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[64];
data/musl-1.2.1/src/stdlib/wcstol.c:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[64];
data/musl-1.2.1/src/string/bcopy.c:5:6:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void bcopy(const void *s1, void *s2, size_t n)
data/musl-1.2.1/src/string/memcpy.c:5:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void *memcpy(void *restrict dest, const void *restrict src, size_t n)
data/musl-1.2.1/src/string/memmove.c:15:50:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if ((uintptr_t)s-(uintptr_t)d-n <= -2*n) return memcpy(d, s, n);
data/musl-1.2.1/src/string/mempcpy.c:6:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return (char *)memcpy(dest, src, n) + n;
data/musl-1.2.1/src/string/strdup.c:9:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(d, s, l+1);
data/musl-1.2.1/src/string/strerror_r.c:10:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, msg, buflen-1);
data/musl-1.2.1/src/string/strerror_r.c:15:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, msg, l+1);
data/musl-1.2.1/src/string/strndup.c:9:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, s, l);
data/musl-1.2.1/src/temp/mkdtemp.c:21:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(template+l-6, "XXXXXX", 6);
data/musl-1.2.1/src/temp/mkostemps.c:20:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fd = open(template, flags | O_RDWR | O_CREAT | O_EXCL, 0600))>=0)
data/musl-1.2.1/src/temp/mkostemps.c:24:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(template+l-len-6, "XXXXXX", 6);
data/musl-1.2.1/src/temp/mkstemp.c:3:5:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
int mkstemp(char *template)
data/musl-1.2.1/src/temp/mkstemp.c:8:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
weak_alias(mkstemp, mkstemp64);
data/musl-1.2.1/src/thread/__unmapself.c:9:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char shared_stack[256];
data/musl-1.2.1/src/thread/pthread_cancel.c:46:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern hidden const char __cp_begin[1], __cp_end[1], __cp_cancel[1];
data/musl-1.2.1/src/thread/pthread_create.c:338:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&args->sig_mask, &set, sizeof args->sig_mask);
data/musl-1.2.1/src/thread/pthread_setname_np.c:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char f[sizeof "/proc/self/task//comm" + 3*sizeof(int)];
data/musl-1.2.1/src/thread/pthread_setname_np.c:22:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(f, O_WRONLY)) < 0 || write(fd, name, len) < 0) status = errno;
data/musl-1.2.1/src/thread/sem_open.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/musl-1.2.1/src/thread/sem_open.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[NAME_MAX+10];
data/musl-1.2.1/src/thread/sem_open.c:81:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(name, FLAGS);
data/musl-1.2.1/src/thread/sem_open.c:112:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(tmp, O_CREAT|O_EXCL|FLAGS, mode);
data/musl-1.2.1/src/time/__tz.c:12:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *__tzname[2] = { 0, 0 };
data/musl-1.2.1/src/time/__tz.c:18:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char std_name[TZNAME_MAX+1];
data/musl-1.2.1/src/time/__tz.c:19:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char dst_name[TZNAME_MAX+1];
data/musl-1.2.1/src/time/__tz.c:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char old_tz_buf[32];
data/musl-1.2.1/src/time/__tz.c:62:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void getrule(const char **p, int rule[5])
data/musl-1.2.1/src/time/__tz.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[NAME_MAX+25], *pathname=buf+24;
data/musl-1.2.1/src/time/__tz.c:148:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (old_tz) memcpy(old_tz, s, i+1);
data/musl-1.2.1/src/time/__tz.c:161:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(pathname, s, l+1);
data/musl-1.2.1/src/time/__tz.c:165:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(pathname-l, try, l);
data/musl-1.2.1/src/time/asctime.c:5:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[26];
data/musl-1.2.1/src/time/getdate.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fmt[100], *p;
data/musl-1.2.1/src/time/getdate.c:25:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(datemsk, "rbe");
data/musl-1.2.1/src/time/strftime.c:45:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *__strftime_fmt_1(char (*s)[100], size_t *l, int f, const struct tm *tm, locale_t loc, int pad)
data/musl-1.2.1/src/time/strftime.c:45:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *__strftime_fmt_1(char (*s)[100], size_t *l, int f, const struct tm *tm, locale_t loc, int pad)
data/musl-1.2.1/src/time/strftime.c:218:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/musl-1.2.1/src/time/strftime.c:266:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s+l, t, k);
data/musl-1.2.1/src/time/time_impl.h:10:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
hidden const char *__strftime_fmt_1(char (*)[100], size_t *, int, const struct tm *, locale_t, int);
data/musl-1.2.1/src/time/time_impl.h:10:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
hidden const char *__strftime_fmt_1(char (*)[100], size_t *, int, const struct tm *, locale_t, int);
data/musl-1.2.1/src/time/wcsftime.c:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/musl-1.2.1/src/time/wcsftime.c:11:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wbuf[100];
data/musl-1.2.1/src/unistd/ctermid.c:6:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	return s ? strcpy(s, "/dev/tty") : "/dev/tty";
data/musl-1.2.1/src/unistd/faccessat.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char stack[1024];
data/musl-1.2.1/src/unistd/fchdir.c:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[15+3*sizeof(int)];
data/musl-1.2.1/src/unistd/fchown.c:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[15+3*sizeof(int)];
data/musl-1.2.1/src/unistd/getcwd.c:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[buf ? 1 : PATH_MAX];
data/musl-1.2.1/src/unistd/ttyname.c:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[TTY_NAME_MAX];
data/musl-1.2.1/src/unistd/ttyname_r.c:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char procname[sizeof "/proc/self/fd/" + 3*sizeof(int) + 2];
data/musl-1.2.1/include/malloc.h:17:7:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
void *memalign(size_t, size_t);
data/musl-1.2.1/include/stdio.h:90:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int fgetc(FILE *);
data/musl-1.2.1/include/stdio.h:91:5:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int getc(FILE *);
data/musl-1.2.1/include/stdio.h:92:5:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int getchar(void);
data/musl-1.2.1/include/stdio.h:197:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cookie_read_function_t *read;
data/musl-1.2.1/include/stdlib.h:143:7:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
void *memalign(size_t, size_t);
data/musl-1.2.1/include/string.h:32:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char *strncpy (char *__restrict, const char *__restrict, size_t);
data/musl-1.2.1/include/string.h:35:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
char *strncat (char *__restrict, const char *__restrict, size_t);
data/musl-1.2.1/include/string.h:52:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen (const char *);
data/musl-1.2.1/include/string.h:89:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define	strdupa(x)	strcpy(alloca(strlen(x)+1),x)
data/musl-1.2.1/include/sys/stat.h:80:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
mode_t umask(mode_t);
data/musl-1.2.1/include/sys/un.h:23:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen(const char *);
data/musl-1.2.1/include/sys/un.h:24:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define SUN_LEN(s) (2+strlen((s)->sun_path))
data/musl-1.2.1/include/ulimit.h:11:6:  [1] (obsolete) ulimit:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name, which is NOT obsolete) (CWE-676). Use getrlimit(2),
  setrlimit(2), and sysconf(3) instead.
long ulimit (int, ...);
data/musl-1.2.1/include/unistd.h:46:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t read(int, void *, size_t);
data/musl-1.2.1/include/unistd.h:150:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
int usleep(unsigned);
data/musl-1.2.1/include/wchar.h:51:10:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
wchar_t *wcsncpy (wchar_t *__restrict, const wchar_t *__restrict, size_t);
data/musl-1.2.1/include/wchar.h:54:10:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
wchar_t *wcsncat (wchar_t *__restrict, const wchar_t *__restrict, size_t);
data/musl-1.2.1/include/wchar.h:71:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t wcslen (const wchar_t *);
data/musl-1.2.1/ldso/dynlink.c:577:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		r = read(fd, q, n);
data/musl-1.2.1/ldso/dynlink.c:620:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t l = read(fd, buf, sizeof buf);
data/musl-1.2.1/ldso/dynlink.c:874:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p->rpath = malloc(strlen(p->rpath_orig) + n*l + 1);
data/musl-1.2.1/ldso/dynlink.c:1033:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(name) > NAME_MAX) return 0;
data/musl-1.2.1/ldso/dynlink.c:1119:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	alloc_size = sizeof *p + strlen(pathname) + 1;
data/musl-1.2.1/ldso/dynlink.c:1155:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(uintptr_t)(p->name+strlen(p->name)+sizeof(size_t)));
data/musl-1.2.1/ldso/dynlink.c:1751:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t l = strlen(ldname);
data/musl-1.2.1/src/aio/aio.c:245:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = !q->seekable ? read(fd, buf, len) : pread(fd, buf, len, off);
data/musl-1.2.1/src/env/setenv.c:35:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l2 = strlen(value);
data/musl-1.2.1/src/internal/stdio_impl.h:28:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	size_t (*read)(FILE *, unsigned char *, size_t);
data/musl-1.2.1/src/legacy/getpass.c:28:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	l = read(fd, password, sizeof password);
data/musl-1.2.1/src/legacy/ulimit.c:5:6:  [1] (obsolete) ulimit:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name, which is NOT obsolete) (CWE-676). Use getrlimit(2),
  setrlimit(2), and sysconf(3) instead.
long ulimit(int cmd, ...)
data/musl-1.2.1/src/legacy/valloc.c:7:9:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
	return memalign(PAGE_SIZE, size);
data/musl-1.2.1/src/linux/eventfd.c:17:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return (sizeof(*value) == read(fd, value, sizeof(*value))) ? 0 : -1;
data/musl-1.2.1/src/locale/catopen.c:51:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			case 'N': v=name; l=strlen(v); break;
data/musl-1.2.1/src/locale/catopen.c:52:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			case 'L': v=lang; l=strlen(v); break;
data/musl-1.2.1/src/locale/dcngettext.c:161:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		loclen = strlen(locname);
data/musl-1.2.1/src/locale/iconv.c:108:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			for (; *s; s+=strlen((void *)s)+1);
data/musl-1.2.1/src/locale/iconv.c:111:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s += strlen((void *)s)+1;
data/musl-1.2.1/src/locale/setlocale.c:54:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t l = strlen(part);
data/musl-1.2.1/src/locale/strxfrm.c:8:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(src);
data/musl-1.2.1/src/locale/textdomain.c:18:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t domlen = strlen(domainname);
data/musl-1.2.1/src/locale/wcsxfrm.c:8:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = wcslen(src);
data/musl-1.2.1/src/malloc/memalign.c:4:7:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
void *memalign(size_t align, size_t len)
data/musl-1.2.1/src/misc/basename.c:8:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(s)-1;
data/musl-1.2.1/src/misc/dirname.c:8:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(s)-1;
data/musl-1.2.1/src/misc/forkpty.c:41:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(p[0], &ec, sizeof ec) > 0) {
data/musl-1.2.1/src/misc/getdomainname.c:11:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!len || strlen(temp.domainname) >= len) {
data/musl-1.2.1/src/misc/getopt.c:22:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	&& fwrite(b, strlen(b), 1, f)
data/musl-1.2.1/src/misc/getopt_long.c:101:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(longopts[i].name));
data/musl-1.2.1/src/misc/getopt_long.c:113:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(longopts[i].name));
data/musl-1.2.1/src/misc/getopt_long.c:132:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(argv[optind]+2));
data/musl-1.2.1/src/misc/getsubopt.c:12:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else *opt = s + strlen(s);
data/musl-1.2.1/src/misc/getsubopt.c:15:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t l = strlen(keys[i]);
data/musl-1.2.1/src/misc/nftw.c:25:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(path), j = l && path[l-1]=='/' ? l-1 : l;
data/musl-1.2.1/src/misc/nftw.c:95:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(de->d_name) >= PATH_MAX-l) {
data/musl-1.2.1/src/misc/nftw.c:129:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(path);
data/musl-1.2.1/src/multibyte/mbsrtowcs.c:24:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!ws) return strlen((const char *)s);
data/musl-1.2.1/src/network/getaddrinfo.c:95:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	canon_len = strlen(canon);
data/musl-1.2.1/src/network/gethostbyname2_r.c:47:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	need += strlen(name)+1;
data/musl-1.2.1/src/network/gethostbyname2_r.c:48:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	need += strlen(canon)+1;
data/musl-1.2.1/src/network/gethostbyname2_r.c:68:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf += strlen(h->h_name)+1;
data/musl-1.2.1/src/network/gethostbyname2_r.c:73:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf += strlen(h->h_aliases[1])+1;
data/musl-1.2.1/src/network/getnameinfo.c:182:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(buf) >= nodelen) return EAI_OVERFLOW;
data/musl-1.2.1/src/network/getnameinfo.c:194:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(p) >= servlen)
data/musl-1.2.1/src/network/if_indextoname.c:22:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	return strncpy(name, ifr.ifr_name, IF_NAMESIZE);
data/musl-1.2.1/src/network/if_nametoindex.c:14:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
data/musl-1.2.1/src/network/inet_ntop.c:43:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(buf) < l) {
data/musl-1.2.1/src/network/lookup_name.c:52:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(name);
data/musl-1.2.1/src/network/lookup_serv.c:70:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(name);
data/musl-1.2.1/src/network/proto.c:64:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	idx += strlen(p.p_name) + 2;
data/musl-1.2.1/src/network/resolvconf.c:37:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			do c = getc(f);
data/musl-1.2.1/src/network/resolvconf.c:77:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t l = strlen(p);
data/musl-1.2.1/src/passwd/getspnam_r.c:67:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t k, l = strlen(name);
data/musl-1.2.1/src/passwd/getspnam_r.c:108:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (fgets(buf, size, f) && (k=strlen(buf))>0) {
data/musl-1.2.1/src/passwd/nscd_query.c:31:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			{(char*)key, strlen(key)+1}
data/musl-1.2.1/src/process/posix_spawn.c:190:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read(args.p[0], &ec, sizeof ec) != sizeof ec) ec = 0;
data/musl-1.2.1/src/process/posix_spawn_file_actions_addchdir.c:9:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	struct fdop *op = malloc(sizeof *op + strlen(path) + 1);
data/musl-1.2.1/src/process/posix_spawn_file_actions_addopen.c:9:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	struct fdop *op = malloc(sizeof *op + strlen(path) + 1);
data/musl-1.2.1/src/regex/glob.c:140:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t l = strlen(de->d_name);
data/musl-1.2.1/src/regex/glob.c:265:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (append(&tail, pat, strlen(pat), 0))
data/musl-1.2.1/src/regex/regerror.c:33:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (s=messages; e && *s; e--, s+=strlen(s)+1);
data/musl-1.2.1/src/regex/tre.h:70:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define tre_strlen  wcslen
data/musl-1.2.1/src/stat/umask.c:4:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
mode_t umask(mode_t mode)
data/musl-1.2.1/src/stdio/__uflow.c:9:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!__toread(f) && f->read(f, &c, 1)==1) return c;
data/musl-1.2.1/src/stdio/fgetc.c:4:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int fgetc(FILE *f)
data/musl-1.2.1/src/stdio/fopencookie.c:27:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!fc->iofuncs.read) goto bail;
data/musl-1.2.1/src/stdio/fopencookie.c:30:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = fc->iofuncs.read(fc->cookie, (char *) buf, len2);
data/musl-1.2.1/src/stdio/fopencookie.c:40:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = fc->iofuncs.read(fc->cookie, (char *) f->rpos, f->buf_size);
data/musl-1.2.1/src/stdio/fputs.c:6:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(s);
data/musl-1.2.1/src/stdio/fread.c:27:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		k = __toread(f) ? 0 : f->read(f, dest, l);
data/musl-1.2.1/src/stdio/freopen.c:35:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		f->read = f2->read;
data/musl-1.2.1/src/stdio/getc.c:4:5:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int getc(FILE *f)
data/musl-1.2.1/src/stdio/getc.c:9:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
weak_alias(getc, _IO_getc);
data/musl-1.2.1/src/stdio/getchar.c:4:5:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int getchar(void)
data/musl-1.2.1/src/stdio/perror.c:19:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwrite(msg, strlen(msg), 1, f);
data/musl-1.2.1/src/stdio/perror.c:23:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(errstr, strlen(errstr), 1, f);
data/musl-1.2.1/src/stdio/tempnam.c:23:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dl = strlen(dir);
data/musl-1.2.1/src/stdio/tempnam.c:24:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pl = strlen(pfx);
data/musl-1.2.1/src/string/strcasestr.c:6:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(n);
data/musl-1.2.1/src/string/strcat.c:5:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strcpy(dest + strlen(dest), src);
data/musl-1.2.1/src/string/strchrnul.c:13:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!c) return (char *)s + strlen(s);
data/musl-1.2.1/src/string/strdup.c:6:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(s);
data/musl-1.2.1/src/string/strerror_r.c:7:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(msg);
data/musl-1.2.1/src/string/strlcat.c:7:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (l == n) return l + strlen(s);
data/musl-1.2.1/src/string/strlcpy.c:33:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return d-d0 + strlen(s);
data/musl-1.2.1/src/string/strlen.c:10:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen(const char *s)
data/musl-1.2.1/src/string/strncat.c:3:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
char *strncat(char *restrict d, const char *restrict s, size_t n)
data/musl-1.2.1/src/string/strncat.c:6:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	d += strlen(d);
data/musl-1.2.1/src/string/strncpy.c:3:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char *strncpy(char *restrict d, const char *restrict s, size_t n)
data/musl-1.2.1/src/string/strrchr.c:5:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return __memrchr(s, c, strlen(s) + 1);
data/musl-1.2.1/src/string/wcpcpy.c:5:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return wcscpy(d, s) + wcslen(s);
data/musl-1.2.1/src/string/wcpncpy.c:5:9:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	return wcsncpy(d, s, n) + wcsnlen(s, n);
data/musl-1.2.1/src/string/wcscat.c:5:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wcscpy(dest + wcslen(dest), src);
data/musl-1.2.1/src/string/wcschr.c:5:32:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!c) return (wchar_t *)s + wcslen(s);
data/musl-1.2.1/src/string/wcscspn.c:6:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!c[0]) return wcslen(s);
data/musl-1.2.1/src/string/wcscspn.c:7:48:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!c[1]) return (s=wcschr(a=s, *c)) ? s-a : wcslen(a);
data/musl-1.2.1/src/string/wcsdup.c:6:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = wcslen(s);
data/musl-1.2.1/src/string/wcslen.c:3:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t wcslen(const wchar_t *s)
data/musl-1.2.1/src/string/wcsncat.c:3:10:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
wchar_t *wcsncat(wchar_t *restrict d, const wchar_t *restrict s, size_t n)
data/musl-1.2.1/src/string/wcsncat.c:6:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	d += wcslen(d);
data/musl-1.2.1/src/string/wcsncpy.c:3:10:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
wchar_t *wcsncpy(wchar_t *restrict d, const wchar_t *restrict s, size_t n)
data/musl-1.2.1/src/string/wcsrchr.c:6:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (p=s+wcslen(s); p>=s && *p!=c; p--);
data/musl-1.2.1/src/temp/mkdtemp.c:8:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(template);
data/musl-1.2.1/src/temp/mkostemps.c:10:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(template);
data/musl-1.2.1/src/temp/mktemp.c:9:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(template);
data/musl-1.2.1/src/time/__tz.c:140:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(s);
data/musl-1.2.1/src/time/__tz.c:159:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t l = strlen(s);
data/musl-1.2.1/src/time/__tz.c:164:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					l = strlen(try);
data/musl-1.2.1/src/time/strftime.c:205:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*l = strlen(fmt);
data/musl-1.2.1/src/time/strptime.c:94:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(ex);
data/musl-1.2.1/src/time/strptime.c:101:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(ex);
data/musl-1.2.1/src/time/strptime.c:187:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(ex);
data/musl-1.2.1/src/unistd/getlogin_r.c:9:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(logname) >= size) return ERANGE;
data/musl-1.2.1/src/unistd/read.c:4:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t read(int fd, void *buf, size_t count)
data/musl-1.2.1/src/unistd/usleep.c:5:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
int usleep(unsigned useconds)

ANALYSIS SUMMARY:

Hits = 910
Lines analyzed = 103748 in approximately 3.13 seconds (33156 lines/second)
Physical Source Lines of Code (SLOC) = 84804
Hits@level = [0]  71 [1] 135 [2] 540 [3]  62 [4] 162 [5]  11
Hits@level+ = [0+] 981 [1+] 910 [2+] 775 [3+] 235 [4+] 173 [5+]  11
Hits/KSLOC@level+ = [0+] 11.5679 [1+] 10.7306 [2+] 9.13872 [3+] 2.7711 [4+] 2.04 [5+] 0.129711
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.