Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/openjdk-11-jre-dcevm-11.0.9+1/make/hotspot/src/native/dtrace/generateJvmOffsets.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/make/langtools/test/HelloWorld.gold.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/aarch64Test.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/abstractInterpreter_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/bytecodes_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/bytecodes_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/bytes_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_CodeStubs_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_Defs_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FpuStackSim_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FpuStackSim_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FrameMap_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FrameMap_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIRAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIRAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIRGenerator_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIR_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LinearScan_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LinearScan_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_MacroAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_MacroAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_Runtime1_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_globals_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c2_globals_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c2_init_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/codeBuffer_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/compiledIC_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/compiledIC_aot_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/copy_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/depChecker_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/depChecker_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/disassembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/g1/g1BarrierSetAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/g1/g1BarrierSetAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/barrierSetAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/barrierSetAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/cardTableBarrierSetAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/cardTableBarrierSetAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/modRefBarrierSetAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/modRefBarrierSetAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/shenandoahBarrierSetAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/shenandoahBarrierSetAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/globalDefinitions_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/globals_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/icBuffer_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/icache_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/icache_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/immediate_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/immediate_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interp_masm_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interp_masm_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interpreterRT_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interpreterRT_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/javaFrameAnchor_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/jniFastGetField_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/jniTypes_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/jvmciCodeInstaller_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64_log.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64_trig.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/methodHandles_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/methodHandles_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/nativeInst_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/nativeInst_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/registerMap_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/register_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/register_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/register_definitions_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/relocInfo_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/relocInfo_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/runtime_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/sharedRuntime_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/stubGenerator_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/stubRoutines_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/stubRoutines_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateInterpreterGenerator_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmStructs_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmreg_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmreg_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmreg_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vtableStubs_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/abstractInterpreter_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_32.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/bytes_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_CodeStubs_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_Defs_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FpuStackSim_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FpuStackSim_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FrameMap_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FrameMap_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRAssembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRAssembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRGenerator_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRGenerator_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIR_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LinearScan_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LinearScan_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_MacroAssembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_MacroAssembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_Runtime1_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_globals_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c2_globals_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/codeBuffer_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/compiledIC_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/copy_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/depChecker_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/depChecker_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/disassembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/g1/g1BarrierSetAssembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/g1/g1BarrierSetAssembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/barrierSetAssembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/barrierSetAssembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/cardTableBarrierSetAssembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/cardTableBarrierSetAssembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/modRefBarrierSetAssembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/modRefBarrierSetAssembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/globalDefinitions_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/globals_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/icBuffer_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/icache_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/icache_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interp_masm_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interp_masm_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interpreterRT_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interpreterRT_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/javaFrameAnchor_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/jniFastGetField_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/jniTypes_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/jvmciCodeInstaller_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/methodHandles_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/methodHandles_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_32.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/registerMap_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/register_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/register_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/register_definitions_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/relocInfo_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/relocInfo_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/runtime_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/sharedRuntime_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubGenerator_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutines_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutines_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateInterpreterGenerator_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmStructs_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmreg_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmreg_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmreg_arm.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vtableStubs_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/abstractInterpreter_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/bytes_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_CodeStubs_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Defs_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_FpuStackSim_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_FrameMap_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_FrameMap_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRGenerator_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIR_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LinearScan_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LinearScan_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_globals_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c2_globals_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c2_init_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/codeBuffer_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/compiledIC_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/copy_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/depChecker_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/disassembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/frame_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/frame_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/frame_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/barrierSetAssembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/barrierSetAssembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/cardTableBarrierSetAssembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/cardTableBarrierSetAssembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/modRefBarrierSetAssembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/modRefBarrierSetAssembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/globalDefinitions_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/globals_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/icBuffer_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/icache_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/icache_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interpreterRT_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interpreterRT_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/javaFrameAnchor_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/jniFastGetField_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/jniTypes_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/jvmciCodeInstaller_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/methodHandles_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/methodHandles_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/nativeInst_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/nativeInst_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/registerMap_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/register_definitions_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/register_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/register_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/relocInfo_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/relocInfo_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/runtime_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/sharedRuntime_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubRoutines_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubRoutines_ppc_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateInterpreterGenerator_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmStructs_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmreg_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmreg_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmreg_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vtableStubs_ppc_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/abstractInterpreter_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/bytes_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_CodeStubs_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_Defs_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_FpuStackSim_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_FrameMap_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_FrameMap_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIRAssembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIRAssembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIRGenerator_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIR_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LinearScan_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LinearScan_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_MacroAssembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_MacroAssembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_Runtime1_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_globals_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c2_globals_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c2_init_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/codeBuffer_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/compiledIC_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/copy_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/depChecker_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/disassembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/g1/g1BarrierSetAssembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/g1/g1BarrierSetAssembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/barrierSetAssembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/barrierSetAssembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/cardTableBarrierSetAssembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/cardTableBarrierSetAssembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/modRefBarrierSetAssembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/modRefBarrierSetAssembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/globalDefinitions_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/globals_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/icBuffer_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/icache_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/icache_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interp_masm_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interp_masm_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interpreterRT_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interpreterRT_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/javaFrameAnchor_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/jniFastGetField_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/jniTypes_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/jvmciCodeInstaller_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/macroAssembler_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/macroAssembler_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/macroAssembler_s390.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/methodHandles_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/methodHandles_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/nativeInst_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/nativeInst_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/registerMap_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/registerSaver_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/register_definitions_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/register_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/register_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/relocInfo_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/relocInfo_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/runtime_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/sharedRuntime_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/stubGenerator_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/stubRoutines_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/stubRoutines_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateInterpreterGenerator_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateTable_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateTable_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmStructs_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmreg_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmreg_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmreg_s390.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vtableStubs_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/abstractInterpreter_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/assembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/assembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/assembler_sparc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/bytes_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_CodeStubs_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_Defs_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FpuStackSim_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FpuStackSim_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FrameMap_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FrameMap_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRGenerator_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIR_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LinearScan_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LinearScan_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_Runtime1_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_globals_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c2_globals_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c2_init_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/codeBuffer_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/compiledIC_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/copy_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/depChecker_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/depChecker_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/disassembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/barrierSetAssembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/barrierSetAssembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/cardTableBarrierSetAssembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/cardTableBarrierSetAssembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/modRefBarrierSetAssembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/modRefBarrierSetAssembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/globalDefinitions_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/globals_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/icBuffer_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/icache_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/icache_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interpreterRT_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interpreterRT_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/javaFrameAnchor_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/jniFastGetField_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/jniTypes_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/jvmciCodeInstaller_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/memset_with_concurrent_readers_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/registerMap_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/register_definitions_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/register_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/register_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/relocInfo_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/relocInfo_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/runtime_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubRoutines_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubRoutines_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmStructs_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmreg_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmreg_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmreg_sparc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vtableStubs_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/abstractInterpreter_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/bytes_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_CodeStubs_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Defs_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FpuStackSim_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FpuStackSim_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FrameMap_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FrameMap_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRGenerator_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIR_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LinearScan_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LinearScan_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_globals_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c2_globals_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c2_init_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/codeBuffer_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/compiledIC_aot_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/compiledIC_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/copy_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/crc32c.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/depChecker_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/depChecker_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/disassembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/modRefBarrierSetAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/modRefBarrierSetAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/globalDefinitions_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/globals_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/icBuffer_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/icache_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/icache_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interpreterRT_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interpreterRT_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interpreterRT_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/javaFrameAnchor_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jniFastGetField_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jniFastGetField_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jniTypes_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jvmciCodeInstaller_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/rdtsc_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/rdtsc_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/registerMap_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/registerMap_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/register_definitions_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/register_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/register_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/relocInfo_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/relocInfo_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/runtime_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/runtime_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmStructs_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmreg_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmreg_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmreg_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/abstractInterpreter_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/assembler_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/assembler_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/assembler_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytecodeInterpreter_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytecodeInterpreter_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytecodeInterpreter_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytes_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/codeBuffer_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/compiledIC_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/copy_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/cppInterpreterGenerator_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/cppInterpreter_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/cppInterpreter_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/depChecker_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/depChecker_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/disassembler_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/disassembler_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/entryFrame_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/entry_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/fakeStubFrame_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/g1/g1BarrierSetAssembler_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/shared/barrierSetAssembler_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/shared/cardTableBarrierSetAssembler_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/shared/modRefBarrierSetAssembler_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/globalDefinitions_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/globals_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/icBuffer_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/icache_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/icache_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interp_masm_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interpreterFrame_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interpreterRT_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interpreterRT_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/javaFrameAnchor_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/jniFastGetField_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/jniTypes_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/macroAssembler_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/macroAssembler_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/methodHandles_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/methodHandles_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/nativeInst_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/nativeInst_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/registerMap_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/register_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/register_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/relocInfo_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/relocInfo_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/sharedRuntime_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stack_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stack_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stack_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stubGenerator_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stubRoutines_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stubRoutines_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmStructs_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmreg_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmreg_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmreg_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vtableStubs_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/c1_globals_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/c2_globals_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/decoder_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/globals_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libodm_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libodm_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/loadlib_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/loadlib_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/misc_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/misc_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/osThread_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/osThread_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_share_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/safepointMechanism_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/threadCritical_aix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/vmStructs_aix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/c1_globals_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/c2_globals_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/decoder_machO.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/decoder_machO.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/globals_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/osThread_bsd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/osThread_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_share_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/semaphore_bsd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/semaphore_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/threadCritical_bsd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/vmStructs_bsd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/c1_globals_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/c2_globals_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/decoder_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/globals_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osThread_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osThread_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_share_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/threadCritical_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/vmStructs_linux.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/include/jvm_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/jvm_posix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/semaphore_posix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/semaphore_posix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/threadLocalStorage_posix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/vmError_posix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/c1_globals_solaris.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/c2_globals_solaris.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/decoder_solaris.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/globals_solaris.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/osThread_solaris.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/osThread_solaris.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_share_solaris.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/threadCritical_solaris.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/vmStructs_solaris.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/c1_globals_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/c2_globals_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/decoder_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/globals_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/include/jvm_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/iphlp_interface.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/iphlp_interface.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/jvm_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/osThread_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/osThread_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_share_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/pdh_interface.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/pdh_interface.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/semaphore_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/semaphore_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/sharedRuntimeRem.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/threadCritical_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/threadLocalStorage_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/vmError_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/vmStructs_windows.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/atomic_aix_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/bytes_aix_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/globals_aix_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/orderAccess_aix_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/os_aix_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/os_aix_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/prefetch_aix_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/thread_aix_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/thread_aix_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/vmStructs_aix_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/assembler_bsd_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/atomic_bsd_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/bytes_bsd_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/copy_bsd_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/globals_bsd_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/orderAccess_bsd_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/prefetch_bsd_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/thread_bsd_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/thread_bsd_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/vmStructs_bsd_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/vm_version_bsd_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/assembler_bsd_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/atomic_bsd_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/bytes_bsd_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/globals_bsd_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/orderAccess_bsd_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/prefetch_bsd_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/thread_bsd_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/thread_bsd_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/vmStructs_bsd_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/vm_version_bsd_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/assembler_linux_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/atomic_linux_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/bytes_linux_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/copy_linux_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/globals_linux_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/orderAccess_linux_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/prefetch_linux_aarch64.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/thread_linux_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/thread_linux_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/vmStructs_linux_aarch64.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/vm_version_linux_aarch64.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/atomic_linux_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/bytes_linux_arm.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/copy_linux_arm.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/globals_linux_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/macroAssembler_linux_arm_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/orderAccess_linux_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/os_linux_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/os_linux_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/prefetch_linux_arm.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/thread_linux_arm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/thread_linux_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/vmStructs_linux_arm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/vm_version_linux_arm_32.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/atomic_linux_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/bytes_linux_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/globals_linux_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/orderAccess_linux_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/os_linux_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/os_linux_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/prefetch_linux_ppc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/thread_linux_ppc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/thread_linux_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/vmStructs_linux_ppc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/atomic_linux_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/bytes_linux_s390.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/globals_linux_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/orderAccess_linux_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/os_linux_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/os_linux_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/prefetch_linux_s390.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/thread_linux_s390.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/thread_linux_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/vmStructs_linux_s390.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/atomic_linux_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/globals_linux_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/orderAccess_linux_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/os_linux_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/os_linux_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/prefetch_linux_sparc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/thread_linux_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/thread_linux_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vmStructs_linux_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/assembler_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/atomic_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/bytes_linux_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/copy_linux_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zAddress_linux_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zGlobals_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zGlobals_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zLargePages_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zNUMA_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zVirtualMemory_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/globals_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/orderAccess_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/os_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/os_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/os_linux_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/prefetch_linux_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/thread_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/thread_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/vmStructs_linux_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/vm_version_linux_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/assembler_linux_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/atomic_linux_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/bytes_linux_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/globals_linux_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/orderAccess_linux_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/prefetch_linux_zero.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/thread_linux_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/thread_linux_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/vmStructs_linux_zero.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/vm_version_linux_zero.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/atomic_solaris_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/count_trailing_zeros_solaris_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/globals_solaris_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/orderAccess_solaris_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/os_solaris_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/os_solaris_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/prefetch_solaris_sparc.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/thread_solaris_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/thread_solaris_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/vmStructs_solaris_sparc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/vm_version_solaris_sparc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/assembler_solaris_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/atomic_solaris_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/bytes_solaris_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/copy_solaris_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/count_trailing_zeros_solaris_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/globals_solaris_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/orderAccess_solaris_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/os_solaris_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/os_solaris_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/os_solaris_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/prefetch_solaris_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/thread_solaris_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/thread_solaris_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/vmStructs_solaris_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/vm_version_solaris_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/assembler_windows_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/atomic_windows_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/bytes_windows_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/globals_windows_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/orderAccess_windows_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/prefetch_windows_x86.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/thread_windows_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/thread_windows_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/unwind_windows_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/vmStructs_windows_x86.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/vm_version_windows_x86.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/arena.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/arena.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/filebuff.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/filebuff.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formsopt.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formsopt.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCompiledMethod.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCompiledMethod.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/compiledIC_aot.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/compiledIC_aot.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/assembler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/assembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/assembler.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/codeBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/codeBuffer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/macroAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/macroAssembler.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/register.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/register.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CFGPrinter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CFGPrinter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Canonicalizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Canonicalizer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CodeStubs.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compiler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compiler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Decorators.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Defs.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Defs.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_FpuStackSim.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_FrameMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_FrameMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_GraphBuilder.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_GraphBuilder.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_IR.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_IR.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Instruction.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Instruction.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_InstructionPrinter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_InstructionPrinter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIR.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIR.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRAssembler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LinearScan.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LinearScan.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_MacroAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Optimizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Optimizer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_RangeCheckElimination.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_RangeCheckElimination.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueStack.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueStack.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueType.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_globals.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/bcEscapeAnalyzer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/bcEscapeAnalyzer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArrayKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArrayKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciBaseObject.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciBaseObject.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciCallProfile.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciCallSite.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciCallSite.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciClassList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstant.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstant.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstantPoolCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstantPoolCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciExceptionHandler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciExceptionHandler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciField.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciField.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciFlags.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciFlags.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstance.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstance.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstanceKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstanceKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMemberName.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMemberName.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMetadata.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMetadata.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethod.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethod.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodBlocks.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodBlocks.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodData.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodHandle.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodHandle.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodType.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciNullObject.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciNullObject.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObject.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObject.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjectFactory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjectFactory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSignature.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSignature.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciStreams.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciStreams.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSymbol.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSymbol.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciType.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArrayKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArrayKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeFlow.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeFlow.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciUtilities.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciUtilities.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciUtilities.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/compilerInterface.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/bytecodeAssembler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/bytecodeAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileError.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderData.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderData.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderHierarchyDCmd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderHierarchyDCmd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderStats.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderStats.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/defaultMethods.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/defaultMethods.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dictionary.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dictionary.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dictionary.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/klassFactory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/klassFactory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/loaderConstraints.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/loaderConstraints.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/metadataOnStackMark.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/metadataOnStackMark.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/moduleEntry.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/moduleEntry.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/packageEntry.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/packageEntry.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/placeholders.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/placeholders.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/protectionDomainCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/protectionDomainCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/resolutionErrors.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/resolutionErrors.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapFrame.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapFrame.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapTableFormat.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stringTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stringTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionary.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionary.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionaryShared.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionaryShared.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verificationType.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verificationType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledIC.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledIC.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledMethod.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledMethod.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledMethod.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfo.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfoRec.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfoRec.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencyContext.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencyContext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/exceptionHandlerTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/exceptionHandlerTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/icBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/icBuffer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/location.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/location.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nativeInst.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/oopRecorder.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/oopRecorder.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/pcDesc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/pcDesc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo_ext.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo_ext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/scopeDesc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/scopeDesc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/stubs.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/stubs.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vmreg.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vmreg.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vmreg.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vtableStubs.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vtableStubs.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/abstractCompiler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/abstractCompiler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileTask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileTask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDefinitions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDefinitions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodLiveness.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodLiveness.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/adaptiveFreeList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/adaptiveFreeList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/allocationStats.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/allocationStats.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsArguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsArguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCardTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCardTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCollectorPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCollectorPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsGCStats.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsGCStats.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsHeap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsLockVerifier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsLockVerifier.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsOopClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsOopClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cms_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/compactibleFreeListSpace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/compactibleFreeListSpace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/compactibleFreeListSpace.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/freeChunk.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/freeChunk.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/jvmFlagConstraintsCMS.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/jvmFlagConstraintsCMS.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parNewGeneration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parNewGeneration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parNewGeneration.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parOopClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parOopClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/promotionInfo.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/promotionInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/promotionInfo.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/vmCMSOperations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/vmCMSOperations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/vmStructs_cms.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/yieldingWorkgroup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/yieldingWorkgroup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonArguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonArguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonBarrierSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonBarrierSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonCollectorPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMemoryPool.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMemoryPool.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonThreadLocalData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilon_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/vmStructs_epsilon.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/collectionSetChooser.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/collectionSetChooser.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/dirtyCardQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/dirtyCardQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/evacuationInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1AllocRegion.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1AllocRegion.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1AllocRegion.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Analytics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Analytics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSetAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSetRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSetRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BiasedArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BiasedArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BlockOffsetTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BlockOffsetTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BlockOffsetTable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardCounts.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardCounts.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardTable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeBlobClosure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeBlobClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeCacheRemSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeCacheRemSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeRootSetTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectionSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectionSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectorPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectorPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectorState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefine.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefine.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefineThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefineThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EdenRegions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacFailure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacFailure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacStats.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacStats.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacStats.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FromCardCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FromCardCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullCollector.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullCollector.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCAdjustTask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCAdjustTask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactTask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactTask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactionPoint.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactionPoint.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarkTask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarkTask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarker.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCOopClosures.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCOopClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCOopClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCPrepareTask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCPrepareTask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCReferenceProcessorExecutor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCReferenceProcessorExecutor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCScope.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCScope.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCTask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCTask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1GCPhaseTimes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1GCPhaseTimes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HRPrinter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapRegionEventSender.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapRegionEventSender.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapRegionTraceType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapSizingPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapSizingPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapSizingPolicy_ext.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapTransition.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapTransition.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapVerifier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapVerifier.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1IHOPControl.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1IHOPControl.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1InCSetState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1InitialMarkToMixedTimeTracker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MMUTracker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MMUTracker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MemoryPool.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MemoryPool.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MonitoringSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MonitoringSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1PageBasedVirtualSpace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1PageBasedVirtualSpace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ParScanThreadState.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ParScanThreadState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ParScanThreadState.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Policy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Policy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Predictions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionToSpaceMapper.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionToSpaceMapper.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetSummary.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetSummary.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetTrackingPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetTrackingPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootClosures.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootProcessor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootProcessor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1SharedClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupStat.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupStat.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1SurvivorRegions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1SurvivorRegions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ThreadLocalData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YCTypes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungGenSizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungGenSizer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungRemSetSamplingThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungRemSetSamplingThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegion.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegion.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegion.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionBounds.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionBounds.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionManager.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionRemSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionRemSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionTracer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionType.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/jvmFlagConstraintsG1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/jvmFlagConstraintsG1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/ptrQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/ptrQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/satbMarkQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/satbMarkQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/sparsePRT.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/sparsePRT.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/survRateGroup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/survRateGroup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/vmStructs_g1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/vm_operations_g1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/vm_operations_g1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningGenerations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningGenerations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningVirtualSpaces.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningVirtualSpaces.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSOldGen.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSOldGen.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSYoungGen.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSYoungGen.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcAdaptivePolicyCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcAdaptivePolicyCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/generationSizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/generationSizer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/immutableSpace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/immutableSpace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/jvmFlagConstraintsParallel.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/jvmFlagConstraintsParallel.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableSpace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableSpace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/objectStartArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/objectStartArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/objectStartArray.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parMarkBitMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parMarkBitMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parMarkBitMap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelArguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelArguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelScavengeHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelScavengeHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelScavengeHeap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallel_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/pcTasks.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/pcTasks.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psAdaptiveSizePolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psAdaptiveSizePolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCardTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCardTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCompactionManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCompactionManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCompactionManager.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGCAdaptivePolicyCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGCAdaptivePolicyCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweep.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweep.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepDecorator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepDecorator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepProxy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMemoryPool.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMemoryPool.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psOldGen.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psOldGen.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psParallelCompact.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psParallelCompact.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psParallelCompact.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionLAB.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionLAB.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionLAB.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionManager.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psScavenge.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psScavenge.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psScavenge.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psTasks.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psTasks.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psVirtualspace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psVirtualspace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psYoungGen.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psYoungGen.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/vmPSOperations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/vmPSOperations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/vmStructs_parallelgc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/defNewGeneration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/defNewGeneration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/defNewGeneration.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/genMarkSweep.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/genMarkSweep.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/markSweep.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/markSweep.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/markSweep.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialArguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialArguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialHeap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serial_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/tenuredGeneration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/tenuredGeneration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/tenuredGeneration.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/vmStructs_serial.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/accessBarrierSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/accessBarrierSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/accessBarrierSupport.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/adaptiveSizePolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/adaptiveSizePolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTableTracer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTableTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/allocTracer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/allocTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSetAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSetConfig.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSetConfig.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/blockOffsetTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/blockOffsetTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/blockOffsetTable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/cardTableBarrierSetC2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/cardTableBarrierSetC2.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardGeneration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardGeneration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardGeneration.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSetAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableRS.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableRS.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectedHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectedHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectedHeap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCPhaseManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCPhaseManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/copyFailedInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/dcevmSharedGC.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/dcevmSharedGC.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcArguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcArguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcArguments.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcCause.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcCause.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfig.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfig.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfiguration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfiguration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcHeapSummary.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcId.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcId.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcLocker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcLocker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcLocker.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcName.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcPolicyCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcPolicyCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcStats.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcStats.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcThreadLocalData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTimer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTimer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTrace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTrace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceSend.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceTime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceTime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceTime.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcUtil.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcUtil.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcUtil.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcWhen.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gc_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genCollectedHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genCollectedHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genMemoryPools.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genMemoryPools.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genOopClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genOopClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generation.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationSpec.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationSpec.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/isGCActiveMark.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/jvmFlagConstraintsGC.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/jvmFlagConstraintsGC.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/memAllocator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/memAllocator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/memset_with_concurrent_readers.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/modRefBarrierSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/modRefBarrierSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/modRefBarrierSetAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/objectCountEventSender.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/objectCountEventSender.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorageParState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorageParState.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/preservedMarks.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/preservedMarks.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/preservedMarks.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceDiscoverer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referencePolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referencePolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessor.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessorPhaseTimes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessorPhaseTimes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessorStats.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefGenPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefGenPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/spaceDecorator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/spaceDecorator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedup.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupStat.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupStat.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/strongRootsScope.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/strongRootsScope.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/suspendibleThreadSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/suspendibleThreadSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/threadLocalAllocBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/threadLocalAllocBuffer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/threadLocalAllocBuffer.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/vmGCOperations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/vmGCOperations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/vmStructs_gc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/weakProcessor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/weakProcessor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerDataArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerDataArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerDataArray.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workgroup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workgroup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAdaptiveHeuristics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAdaptiveHeuristics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahCompactHeuristics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahCompactHeuristics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahHeuristics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahHeuristics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahPassiveHeuristics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahPassiveHeuristics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahStaticHeuristics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahStaticHeuristics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/markBitMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/markBitMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/markBitMap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahIUMode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahIUMode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahMode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahPassiveMode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahPassiveMode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahSATBMode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahSATBMode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/parallelCleaning.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/parallelCleaning.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahAllocRequest.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahArguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahArguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahAsserts.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahAsserts.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetClone.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCodeRoots.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCodeRoots.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectorPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectorPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahControlThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahControlThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahEvacOOMHandler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahEvacOOMHandler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahForwarding.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahForwarding.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahFreeSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahFreeSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahJfrSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahJfrSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahLock.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkCompact.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkCompact.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMemoryPool.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMemoryPool.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMetrics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMetrics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMonitoringSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMonitoringSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahNumberSeq.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahNumberSeq.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahOopClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahOopClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPacer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPacer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPacer.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPadding.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPhaseTimings.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPhaseTimings.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootVerifier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootVerifier.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSharedVariables.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahThreadLocalData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahUtils.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVMOperations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVMOperations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVerifier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVerifier.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkGroup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkGroup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkerPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkerPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoah_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/vmStructs_shenandoah.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/vmStructs_z.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/vmStructs_z.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddress.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddress.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddress.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddressRangeMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddressRangeMap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAllocationFlags.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArray.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrier.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrier.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetAssembler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetAssembler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBitField.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBitMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBitMap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCPU.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCPU.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectedHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectedHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectorPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectorPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDirector.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDirector.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDriver.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDriver.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zErrno.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zErrno.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTableEntry.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zFuture.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zFuture.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zGlobals.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zGlobals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHash.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHash.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeapIterator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeapIterator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zInitialize.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zInitialize.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLargePages.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLargePages.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLargePages.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zList.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLiveMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLiveMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLiveMap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLock.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLock.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMark.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMark.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMark.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkCache.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStack.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStack.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStack.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStackEntry.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkTerminate.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkTerminate.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMemory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMemory.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMessagePort.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMessagePort.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMetronome.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMetronome.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNMethodTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNMethodTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNMethodTableEntry.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNUMA.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNUMA.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zObjectAllocator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zObjectAllocator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOop.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOopClosures.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOopClosures.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOopClosures.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPage.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPage.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPage.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageAllocator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageAllocator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageCache.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTableEntry.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPhysicalMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPhysicalMemory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPhysicalMemory.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPreMappedMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPreMappedMemory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPreMappedMemory.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zReferenceProcessor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zReferenceProcessor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocate.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocate.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSetSelector.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSetSelector.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zResurrection.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zResurrection.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zResurrection.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRootsIterator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRootsIterator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRuntimeWorkers.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRuntimeWorkers.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zServiceability.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zServiceability.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zStat.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zStat.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zThreadLocalData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTracer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTracer.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zUtils.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zUtils.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zValue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zVirtualMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zVirtualMemory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zVirtualMemory.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWeakRootsProcessor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWeakRootsProcessor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWorkers.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWorkers.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWorkers.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/z_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/cds.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/jmm.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/jvm.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/abstractInterpreter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/abstractInterpreter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecode.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeHistogram.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeHistogram.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreterProfiling.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeStream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeStream.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreterGenerator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreterGenerator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interp_masm.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/invocationCounter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/invocationCounter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/rewriter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/rewriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreterGenerator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreterGenerator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/dcmd/jfrDcmds.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/dcmd/jfrDcmds.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jfr.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jfr.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jfrEvents.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrGetAllEventClasses.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrGetAllEventClasses.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaCall.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaCall.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethod.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethod.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bitset.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bitset.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/dfsClosure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/dfsClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edge.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edge.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeStore.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeStore.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeUtils.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/objectSampleMarker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/rootSetClosure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/rootSetClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/eventEmitter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/eventEmitter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleCheckpoint.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleCheckpoint.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleWriter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleWriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/objectSample.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/objectSampler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/objectSampler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/sampleList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/sampleList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/samplePriorityQueue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/samplePriorityQueue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/startOperation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/stopOperation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/granularTimer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/granularTimer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/saveRestore.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/saveRestore.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/unifiedOop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/vmOperation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/metadata/jfrSerializer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrModuleEvent.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrModuleEvent.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrOSInterface.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrOSInterface.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadCPULoadEvent.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadCPULoadEvent.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrCallTrace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrCallTrace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrThreadSampler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrThreadSampler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointWriter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointWriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrMetadataEvent.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrMetadataEvent.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadState.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrType.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdBits.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdEpoch.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdEpoch.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdMacros.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrEventSetting.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrEventSetting.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrEventSetting.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkRotation.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkRotation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrEvent.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrEvent.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrMemorySizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrMemorySizer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrPostBox.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrPostBox.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTraceRepository.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTraceRepository.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpaceRetrieval.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageControl.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageControl.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageUtils.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageUtils.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPool.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPool.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolBuffer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolWriter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolWriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrAllocationTracer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrAllocationTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrEventClass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrEventClass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrFlush.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrFlush.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrIntrinsics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrKlassExtension.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrStackTraceMark.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrStackTraceMark.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadExtension.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadId.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadLocal.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadLocal.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrTraceIdExtension.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBlob.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBlob.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrDoublyLinkedList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrHashtable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrIterator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrJavaLog.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrJavaLog.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrRefCountPointer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrResourceManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrSpinlockHelper.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTimeConverter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTimeConverter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTryLock.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTypes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrBigEndianWriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoders.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoding.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEventWriterHost.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEventWriterHost.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrJavaEventWriter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrJavaEventWriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrNativeEventWriter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrPosition.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrPosition.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageAdapter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageHost.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageHost.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStreamWriterHost.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStreamWriterHost.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrTypeWriterHost.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/compilerRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/compilerRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompiler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompiler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciEnv.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciEnv.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmci_globals.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmci_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/systemDictionary_jvmci.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmStructs_compiler_runtime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmStructs_jvmci.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmStructs_jvmci.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmSymbols_jvmci.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/log.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorators.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorators.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDiagnosticCommand.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDiagnosticCommand.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logHandle.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessage.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessageBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessageBuffer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutputList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutputList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logPrefix.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelection.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelection.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelectionList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelectionList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSetDescriptions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSetDescriptions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag_ext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/binaryTreeDictionary.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/binaryTreeDictionary.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/freeList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/freeList.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/guardedMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/guardedMemory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapShared.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapShared.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapShared.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/iterator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/iterator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/iterator.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/memRegion.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/memRegion.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metadataFactory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/blockFreelist.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/blockFreelist.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/chunkManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/chunkManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaDebug.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaDebug.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metabase.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metablock.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metachunk.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metachunk.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceCommon.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceCommon.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceDCmd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceDCmd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceStatistics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceStatistics.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/occupancyMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/occupancyMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printCLDMetaspaceInfoClosure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printCLDMetaspaceInfoClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printMetaspaceInfoKlassClosure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printMetaspaceInfoKlassClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/smallBlocks.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/smallBlocks.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/spaceManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/spaceManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceNode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceNode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceChunkFreeListSummary.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceClosure.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceGCThresholdUpdater.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceTracer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceTracer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/oopFactory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/oopFactory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/operator_new.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/referenceType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/resourceArea.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/resourceArea.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/resourceArea.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/virtualspace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/virtualspace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/conditional.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/decay.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/enableIf.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/integralConstant.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isConst.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isFloatingPoint.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isIntegral.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isPointer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isRegisteredEnum.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isSame.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isSigned.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isVolatile.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/primitiveConversions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/removeCV.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/removePointer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/removeReference.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/access.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/access.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/access.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessBackend.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessBackend.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessBackend.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessDecorators.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/annotations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/annotations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/array.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/array.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayKlass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayOop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayOop.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/compiledICHolder.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/compiledICHolder.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/compressedOops.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/cpCache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/cpCache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/cpCache.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/fieldInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/fieldStreams.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceClassLoaderKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceClassLoaderKlass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceMirrorKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceMirrorKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceMirrorKlass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceOop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceOop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceRefKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceRefKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceRefKlass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klassVtable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klassVtable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/markOop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/markOop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/markOop.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/metadata.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/metadata.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodCounters.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodCounters.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayOop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayOop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayOop.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopHandle.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopHandle.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopsHierarchy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopsHierarchy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayKlass.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayKlass.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayOop.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayOop.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/verifyOopClosure.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/weakHandle.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/weakHandle.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/weakHandle.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/ad.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/addnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/addnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/adlcVMDeps.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/arraycopynode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/arraycopynode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/buildOopMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/bytecodeInfo.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2_globals.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2_globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2compiler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2compiler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callGenerator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callGenerator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/castnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/castnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/cfgnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/cfgnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/classes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/classes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/coalesce.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/coalesce.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/connode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/connode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/convertnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/convertnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/countbitsnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/countbitsnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/divnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/divnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/doCall.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/domgraph.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/escape.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/escape.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/gcm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/generateOptoStub.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealKit.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealKit.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/ifg.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/ifnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/indexSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/indexSet.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/intrinsicnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/intrinsicnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/lcm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/library_call.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/live.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/live.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/locknode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/locknode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopPredicate.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopTransform.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopUnswitch.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopopts.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/machnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/machnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/macro.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/macro.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/macroArrayCopy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/matcher.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/matcher.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mathexactnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mathexactnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/memnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/memnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/movenode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/movenode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mulnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mulnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/multnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/multnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/narrowptrnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/narrowptrnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/node.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/node.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opaquenode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opaquenode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opcodes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opcodes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/optoreg.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse1.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse3.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parseHelper.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phase.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phase.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phaseX.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phaseX.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phasetype.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/postaloc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regalloc.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regalloc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regmask.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regmask.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/replacednodes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/replacednodes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/rootnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/rootnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/runtime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/runtime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/split_if.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/stringopts.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/stringopts.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/subnode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/subnode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/vectornode.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/vectornode.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/precompiled/precompiled.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/evmCompat.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/forte.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/forte.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniExport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniFastGetField.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniFastGetField.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm_misc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiAgentThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiCodeBlobEvents.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiCodeBlobEvents.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnter.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvThreadState.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvThreadState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEventController.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEventController.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEventController.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiGetLoadedClasses.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiGetLoadedClasses.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiImpl.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiImpl.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiManageCapabilities.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiManageCapabilities.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTagMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTagMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiThreadState.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiThreadState.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiThreadState.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiUtil.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiUtil.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodComparator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodComparator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/perf.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/privilegedStack.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/privilegedStack.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/resolvedMethodTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/resolvedMethodTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/stackwalk.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/stackwalk.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/unsafe.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/unsafe.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments_ext.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments_ext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/atomic.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/basicLock.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/basicLock.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/biasedLocking.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/biasedLocking.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/compilationPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/compilationPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/extendedPC.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldDescriptor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldDescriptor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldDescriptor.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldType.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldType.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsCompiler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsCompiler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagRangeList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagRangeList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagWriteableList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagWriteableList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals_ext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals_extension.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handles.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handles.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handles.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handshake.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handshake.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/icache.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/icache.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/init.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/init.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/java.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/java.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/javaCalls.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/javaCalls.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/javaFrameAnchor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jfieldIDWorkaround.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniHandles.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniHandles.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniHandles.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniPeriodicChecker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniPeriodicChecker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/monitorChunk.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/monitorChunk.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/orderAccess.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/orderAccess.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/osThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/osThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_ext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_perf.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/park.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/park.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfMemory.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/prefetch.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/prefetch.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflectionUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflectionUtils.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/registerMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rframe.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rframe.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rtmLocking.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rtmLocking.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepoint.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepoint.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointMechanism.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointMechanism.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointMechanism.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointVerifiers.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointVerifiers.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/semaphore.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/semaphore.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/serviceThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/serviceThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntimeMath.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntimeTrans.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntimeTrig.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/signature.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/signature.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValue.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValue.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValueCollection.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValueCollection.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/statSampler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/statSampler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubCodeGenerator.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubCodeGenerator.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubRoutines.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubRoutines.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sweeper.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sweeper.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/task.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/task.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadCritical.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadHeapSampler.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadHeapSampler.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadLocalStorage.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadStatisticalInfo.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/tieredThresholdPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/tieredThresholdPolicy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timerTrace.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timerTrace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/unhandledOops.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/unhandledOops.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframeArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframeArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe_hp.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe_hp.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/allocationSite.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/classLoadingService.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/classLoadingService.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand_ext.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/dtraceAttacher.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/dtraceAttacher.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/gcNotifier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/gcNotifier.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/lowMemoryDetector.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/lowMemoryDetector.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocSiteTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocSiteTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocTracker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocTracker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocTracker.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memBaseline.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memBaseline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memReporter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memReporter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryPool.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryPool.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryService.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryService.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryUsage.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtCommon.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtCommon.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtDCmd.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtDCmd.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/runtimeService.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/runtimeService.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadIdTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadIdTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadService.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadService.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/virtualMemoryTracker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/virtualMemoryTracker.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/accessFlags.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/accessFlags.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/align.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/breakpoint.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bytes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/chunkedList.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/compilerWarnings.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTableTasks.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/constantTag.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/constantTag.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/count_trailing_zeros.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder_elf.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder_elf.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/defaultStream.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/dtrace.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/dtrace_disabled.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFuncDescTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFuncDescTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfStringTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfStringTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfSymbolTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfSymbolTable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/errorReporter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/errorReporter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/events.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/events.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/fakeRttiSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalCounter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalCounter.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalCounter.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_gcc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_sparcWorks.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_xlc.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/growableArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/growableArray.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/histogram.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/histogram.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/intHisto.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/intHisto.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/internalVMTests.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/internalVMTests.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/linkedlist.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/macros.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/nativeCallStack.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/nativeCallStack.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/numberSeq.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/numberSeq.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/pair.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/preserveException.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/preserveException.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/quickSort.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/resourceHash.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/singleWriterSynchronizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/singleWriterSynchronizer.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/sizes.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/sizes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/spinYield.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/spinYield.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stack.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stack.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ticks.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ticks.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjava/ProcessHandleImpl_aix.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjli/java_md_aix.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjli/java_md_aix.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnet/aix_close.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/ch/AixPollPort.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/Metrics.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnet/linux_close.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/ch/EPoll.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxWatchService.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/ProcessHandleImpl_macosx.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/bsd_close.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/ch/KQueue.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/MacOSXNativeDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/UTIFileTypeDetector.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/include/jni.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/include/jvmticmlr.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/defines.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_acos.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_asin.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_atan2.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_atanh.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_cosh.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_exp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_fmod.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_log.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_log10.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_rem_pio2.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_remainder.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_scalb.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_sinh.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_sqrt.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/fdlibm.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/jfdlibm.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_cos.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_rem_pio2.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_sin.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_standard.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_tan.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_atan.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_ceil.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_copysign.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_cos.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_expm1.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_fabs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_finite.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_floor.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_frexp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_ilogb.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_isnan.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_ldexp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_lib_version.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_log1p.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_logb.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_matherr.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_modf.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_nextafter.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_rint.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_scalbn.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_signgam.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_significand.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_sin.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_tan.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_tanh.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_acos.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_asin.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_atan2.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_atanh.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_cosh.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_exp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_fmod.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_log.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_log10.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_remainder.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_scalb.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_sinh.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_sqrt.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/AccessController.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Array.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/AtomicLong.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/BootLoader.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Class.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ConstantPool.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Double.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Executable.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Field.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/FileInputStream.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Float.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/NativeAccessors.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Object.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ObjectInputStream.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ObjectOutputStream.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ObjectStreamClass.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/RandomAccessFile.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Reference.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Reflection.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Runtime.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/SecurityManager.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Shutdown.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Signal.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StackStreamFactory.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StackTraceElement.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StrictMath.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/String.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StringCoding.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Thread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Throwable.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/TimeZone.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/VM.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/VMSupport.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/check_version.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/gdefs.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/java_props.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jdk_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jdk_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jio.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jlong.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/sizecalc.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/verify_stub.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/NativeImageBuffer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/endian.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/endian.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/inttypes.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/osSupport.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/emessages.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/manifest_info.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/splashscreen.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/splashscreen_stubs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/DatagramPacket.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/Inet4Address.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/Inet6Address.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/InetAddress.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/net_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/net_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/proxy_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/proxy_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnio/ch/nio.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnio/nio_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_format.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/Adler32.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/CRC32.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/Deflater.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/Inflater.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/compress.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/crc32.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/deflate.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/deflate.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzclose.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/infback.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inffast.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inffast.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inffixed.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inftrees.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inftrees.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/trees.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/trees.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/uncompr.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zadler32.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zconf.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zcrc32.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zlib.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjava/ProcessHandleImpl_solaris.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnet/solaris_close.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/ch/DevPollArrayWrapper.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/ch/SolarisEventPort.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisWatchService.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/include/jni_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/jspawnhelper/jspawnhelper.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/Console_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/FileDescriptor_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/FileOutputStream_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessEnvironment_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/VM_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/gdefs_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jdk_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jdk_util_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jlong_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/locale_str.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjimage/osSupport_unix.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjsig/jsig.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/InetAddressImplFactory.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainSocketImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SdpSupport.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketInputStream.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketOutputStream.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/portconfig.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/MappedByteBuffer.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/DatagramChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/DatagramDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileDispatcherImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileKey.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/InheritedChannel.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/NativeThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/PollSelectorImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/ServerSocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/SocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/SocketDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/UnixAsynchronousServerSocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/UnixAsynchronousSocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/nio_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixCopyFile.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/include/jni_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/FileDescriptor_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/FileOutputStream_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessEnvironment_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/VM_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Win32ErrorMode.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinCAPISeedGenerator.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/gdefs_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_main_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jlong_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/locale_str.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DefaultProxySelector.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/InetAddressImplFactory.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthentication.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/PlainSocketImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketInputStream.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketOutputStream.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/MappedByteBuffer.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileKey.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/Iocp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/Net.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/ServerSocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsAsynchronousFileChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsAsynchronousServerSocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsAsynchronousSocketChannelImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/nio_util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/RegistryFileTypeDetector.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/failure_handler/src/windows/native/libtimeoutHandler/GatherProcessInfoTimeoutHandler.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-death-test.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-message.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-param-test.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-printers.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-spi.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-test-part.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-typed-test.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest_pred_impl.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest_prod.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/custom/gtest-port.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/custom/gtest-printers.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/custom/gtest.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-death-test-internal.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-filepath.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-internal.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-linked_ptr.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-param-util-generated.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-param-util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port-arch.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-string.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-tuple.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-all.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-filepath.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-test-part.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-typed-test.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest_main.cc
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/classfile/test_AltHashing.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/classfile/test_symbolTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/code/test_dependencyContext.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/code/test_vtableStub.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_freeRegionList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1Analytics.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1BiasedArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1CodeCacheRemSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1HeapVerifier.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1IHOPControl.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1Predictions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_heapRegion.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/parallel/test_psAdaptiveSizePolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/parallel/test_psParallelCompact.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_collectedHeap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_collectorPolicy.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_oopStorage.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_oopStorage_parperf.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_preservedMarks.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_workerDataArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zAddress.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zArray.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zBitField.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zBitMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zForwardingTable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zLiveMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zPhysicalMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zVirtualMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestLauncher.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/precompiled.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_networkUtilization.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestFixture.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestFixture.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_gcTraceTime.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_log.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logLevel.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logOutputList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelectionList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logStream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTag.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_chunkManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_guardedMemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_is_metaspace_obj.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metachunk.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_spaceManager.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_conditional.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_decay.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_enableIf.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isConst.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isFloatingPoint.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isIntegral.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isPointer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isRegisteredEnum.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isSame.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isSigned.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isVolatile.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_primitiveConversions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_removeCV.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_removePointer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_removeReference.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_arrayOop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_instanceKlass.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_oop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_typeArrayOop.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/opto/test_mathexact.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_arguments.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_classLoader.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_committed_virtualmemory.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_globals.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_perfdata.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_semaphore.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_virtualMemoryTracker.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_vmStructs.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/unittest.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_align.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap_large.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap_search.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap_setops.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_chunkedList.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_concurrentHashtable.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_count_trailing_zeros.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_globalCounter.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_globalDefinitions.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_java_arithmetic.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_json.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_linkedlist.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_resourceHash.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_singleWriterSynchronizer.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_stringUtils.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/utilitiesHelper.inline.hpp
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/calls/common/libCallsNative.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/calls/libTestDirtyInt.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/floatingpoint/libTestFloatJNIArgs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/floatingpoint/libTestFloatSyncJNIArgs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/jsr292/cr8026328/libTest8026328.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/jvmci/jdk.vm.ci.code.test/libNativeCallTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/runtime/criticalnatives/argumentcorruption/libCNCheckLongArgs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/runtime/criticalnatives/lookup/libCNLookUp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/testlibrary/rtm/libXAbortProvoker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/cslocker/libTestCSLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/g1/TestJNIWeakG1/libTestJNIWeakG1.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libCriticalNative.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNICritical.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNIGlobalRefs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestPinnedGarbage.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jvmti/libTestHeapDump.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/stress/TestJNIBlockFullGC/libTestJNIBlockFullGC.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/stress/gclocker/libTestGCLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/native_sanity/libJniVersion.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/BoolReturn/libJNIBooleanTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/BoolReturn/libNativeSmallIntCalls.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/Nestmates/libNestmatesJNI.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/RedefineTests/libRedefineDoubleDelete.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/SameObject/libSameObject.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/exceptionMsgs/ArrayIndexOutOfBoundsException/libArrayIndexOutOfBoundsExceptionTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/exceptionMsgs/ArrayStoreException/libArrayStoreExceptionTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/execstack/libtest-rw.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/execstack/libtest-rwx.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/handshake/libHandshakeTransitionTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/8025979/libUninitializedStrings.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/8033445/libDefaultMethods.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/CallWithJNIWeak/libCallWithJNIWeak.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/CalleeSavedRegisters/exeFPRegs.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/FindClass/libbootLoaderTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/PrivateInterfaceMethods/libPrivateInterfaceMethods.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/ReturnJNIWeak/libReturnJNIWeak.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/ToStringInInterfaceTest/libToStringTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/atExit/libatExit.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/checked/libTestCheckedEnsureLocalCapacity.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/checked/libTestCheckedJniExceptionCheck.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/terminatedThread/libterminatedThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jsig/libTestJNI.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/libadimalloc.solaris.sparc/liboverflow.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/modules/getModuleJNI/libGetModule.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/noClassDefFoundMsg/libNoClassDefFoundMsg.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/signal/exesigtest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/dcmd/jvmti/AttachFailed/libHasNoEntryPoint.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/dcmd/jvmti/AttachFailed/libReturnError.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleReads/libAddModuleReadsTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleUsesAndProvides/libAddModuleUsesAndProvidesTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/CanGenerateAllClassHook/libCanGenerateAllClassHook.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetModulesInfo/libJvmtiGetAllModulesTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetNamedModule/libGetNamedModuleTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorInfo/libGetOwnedMonitorInfoTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorInfo/libGetOwnedMonitorInfoWithEATest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorStackDepthInfo/libGetOwnedMonitorStackDepthInfoTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorStackDepthInfo/libGetOwnedMonitorStackDepthInfoWithEATest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetSystemProperty/libJvmtiGetSystemPropertyTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/IsModifiableModule/libIsModifiableModuleTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ClassFileLoadHook/libMAAClassFileLoadHook.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ClassLoadPrepare/libMAAClassLoadPrepare.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ThreadStart/libMAAThreadStart.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/NotifyFramePop/libNotifyFramePopTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/StartPhase/AllowedFunctions/libAllowedFunctions.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/sa/libNoFramePointer.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/g1/unloading/libdefine.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC1/libmallocWithGC1.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC2/libmallocWithGC2.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC3/libmallocWithGC3.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC01/libnativeGC01.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC02/libnativeGC02.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC03/libnativeGC03.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC05/libnativeGC05.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent01.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent02.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent03.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent01.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent02.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent03.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine09/agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine09/libVirtualMachine09agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jdi/ThreadReference/forceEarlyReturn/forceEarlyReturn004/libforceEarlyReturn004a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jdi/ThreadReference/forceEarlyReturn/forceEarlyReturn005/libforceEarlyReturn005a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jdwp/ThreadReference/ForceEarlyReturn/forceEarlyReturn002/libforceEarlyReturn002a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps001/addcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps001/libaddcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps002/addcaps002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps002/libaddcaps002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps003/addcaps003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps003/libaddcaps003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload001/agentonload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload001/libagentonload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload002/agentonload002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload002/libagentonload002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload003/agentonload003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload003/libagentonload003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnUnload/agentonunload001/agentonunload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnUnload/agentonunload001/libagentonunload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Allocate/alloc001/alloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Allocate/alloc001/liballoc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/libattach002Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/attach002aAgent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/libattach002aAgent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/libattach008Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/libattach009Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach012/attach012Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach012/libattach012Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/attach014Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/libattach014Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent01.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Target.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Agent01.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Target.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach020/attach020Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach020/libattach020Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach021/attach021Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach021/libattach021Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/attach022Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/libattach022Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/libattach037Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/libattach038Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/libattach039Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/libattach040Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/libattach041Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/libattach042Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent01.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent02.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent01.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent02.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent03.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/attach046Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/libattach046Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach050/attach050Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach050/libattach050Agent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/sharedAgents/libsimpleAgent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/sharedAgents/simpleAgent00.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Breakpoint/breakpoint001/breakpoint001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Breakpoint/breakpoint001/libbreakpoint001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk001/classfloadhk001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk001/libclassfloadhk001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk002/classfloadhk002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk002/libclassfloadhk002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk003/classfloadhk003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk003/libclassfloadhk003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk004/classfloadhk004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk004/libclassfloadhk004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk005/classfloadhk005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk005/libclassfloadhk005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk006/classfloadhk006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk006/libclassfloadhk006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk007/classfloadhk007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk007/libclassfloadhk007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk008/classfloadhk008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk008/libclassfloadhk008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk009/classfloadhk009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk009/libclassfloadhk009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassLoad/classload001/classload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassLoad/classload001/libclassload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassPrepare/classprep001/classprep001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassPrepare/classprep001/libclassprep001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk001/clrbrk001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk001/libclrbrk001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk002/clrbrk002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk002/libclrbrk002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk005/clrbrk005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk005/libclrbrk005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw001/clrfldw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw001/libclrfldw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw002/clrfldw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw002/libclrfldw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw001/clrfmodw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw001/libclrfmodw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw002/clrfmodw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw002/libclrfmodw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodLoad/compmethload001/compmethload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodLoad/compmethload001/libcompmethload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodUnload/compmethunload001/compmethunload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodUnload/compmethunload001/libcompmethunload001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/libcrrawmon001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon002/crrawmon002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon002/libcrrawmon002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DataDumpRequest/datadumpreq001/datadumpreq001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DataDumpRequest/datadumpreq001/libdatadumpreq001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Deallocate/dealloc001/dealloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Deallocate/dealloc001/libdealloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/libdrrawmon001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon003/drrawmon003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon003/libdrrawmon003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon004/drrawmon004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon004/libdrrawmon004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv001/disposeenv001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv001/libdisposeenv001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv002/disposeenv002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv002/libdisposeenv002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DynamicCodeGenerated/dyncodgen001/dyncodgen001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DynamicCodeGenerated/dyncodgen001/libdyncodgen001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Exception/exception001/exception001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Exception/exception001/libexception001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ExceptionCatch/excatch001/excatch001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ExceptionCatch/excatch001/libexcatch001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc001/fieldacc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc001/libfieldacc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc002/fieldacc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc002/libfieldacc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc003/fieldacc003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc003/libfieldacc003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc004/fieldacc004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc004/libfieldacc004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod001/fieldmod001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod001/libfieldmod001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod002/fieldmod002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod002/libfieldmod002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceEarlyReturn/ForceEarlyReturn001/ForceEarlyReturn001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceEarlyReturn/ForceEarlyReturn001/libForceEarlyReturn001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc001/forcegc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc001/libforcegc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc002/forcegc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc002/libforcegc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop001/framepop001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop001/libframepop001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/framepop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/libframepop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionFinish/gcfinish001/gcfinish001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionFinish/gcfinish001/libgcfinish001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart001/gcstart001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart001/libgcstart001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart002/gcstart002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart002/libgcstart002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GenerateEvents/genevents001/genevents001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GenerateEvents/genevents001/libgenevents001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/liballthr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr002/allthr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr002/liballthr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize001/argsize001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize001/libargsize001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize002/argsize002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize002/libargsize002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAvailableProcessors/getavailproc001/getavailproc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAvailableProcessors/getavailproc001/libgetavailproc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes001/bytecodes001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes001/libbytecodes001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes002/bytecodes002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes002/libbytecodes002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes003/bytecodes003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes003/libbytecodes003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps001/getcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps001/libgetcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps002/getcaps002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps002/libgetcaps002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld005/getclfld005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld005/libgetclfld005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld006/getclfld006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld006/libgetclfld006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld007/getclfld007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld007/libgetclfld007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr001/getclsldr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr001/libgetclsldr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr002/getclsldr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr002/libgetclsldr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr003/getclsldr003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr003/libgetclsldr003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss001/clsldrclss001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss001/libclsldrclss001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss002/clsldrclss002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss002/libclsldrclss002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd005/getclmthd005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd005/libgetclmthd005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd006/getclmthd006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd006/libgetclmthd006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd007/getclmthd007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd007/libgetclmthd007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf004/getclmdf004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf004/libgetclmdf004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf005/getclmdf005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf005/libgetclmdf005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf006/getclmdf006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf006/libgetclmdf006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf007/getclmdf007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf007/libgetclmdf007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig004/getclsig004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig004/libgetclsig004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig005/getclsig005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig005/libgetclsig005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig006/getclsig006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig006/libgetclsig006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat005/getclstat005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat005/libgetclstat005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat006/getclstat006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat006/libgetclstat006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat007/getclstat007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat007/libgetclstat007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon001/contmon001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon001/libcontmon001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon002/contmon002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon002/libcontmon002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon003/contmon003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon003/libcontmon003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/curthrcputime001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/libcurthrcputime001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/curthrtimerinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/libcurthrtimerinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnv/GetEnv001/GetEnv001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnv/GetEnv001/libGetEnv001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnvironmentLocalStorage/getenvstor001/getenvstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnvironmentLocalStorage/getenvstor001/libgetenvstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname001/geterrname001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname001/libgeterrname001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname002/geterrname002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname002/libgeterrname002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/libextevents001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/libextfuncs001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl001/getfldecl001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl001/libgetfldecl001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl002/getfldecl002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl002/libgetfldecl002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl004/getfldecl004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl004/libgetfldecl004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf003/getfldmdf003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf003/libgetfldmdf003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf004/getfldmdf004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf004/libgetfldmdf004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm003/getfldnm003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm003/libgetfldnm003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm004/getfldnm004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm004/libgetfldnm004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm005/getfldnm005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm005/libgetfldnm005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt001/framecnt001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt001/libframecnt001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt002/framecnt002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt002/libframecnt002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt003/framecnt003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt003/libframecnt003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc001/frameloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc001/libframeloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/frameloc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/libframeloc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc003/frameloc003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc003/libframeloc003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf005/getintrf005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf005/libgetintrf005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf006/getintrf006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf006/libgetintrf006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf007/getintrf007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf007/libgetintrf007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt001/getjlocfmt001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt001/libgetjlocfmt001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt002/getjlocfmt002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt002/libgetjlocfmt002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab001/getjniftab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab001/libgetjniftab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab002/getjniftab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab002/libgetjniftab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab001/liblinetab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab001/linetab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab002/liblinetab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab002/linetab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab003/liblinetab003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab003/linetab003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss001/libloadedclss001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss001/loadedclss001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss002/libloadedclss002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss002/loadedclss002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal001/getlocal001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal001/libgetlocal001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal002/getlocal002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal002/libgetlocal002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab001/liblocaltab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab001/localtab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab002/liblocaltab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab002/localtab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab003/liblocaltab003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab003/localtab003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab004/liblocaltab004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab004/localtab004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab005/liblocaltab005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab005/localtab005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc001/libmaxloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc001/maxloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc002/libmaxloc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc002/maxloc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls001/declcls001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls001/libdeclcls001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls002/declcls002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls002/libdeclcls002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls003/declcls003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls003/libdeclcls003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc001/libmethloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc001/methloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc002/libmethloc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc002/methloc002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod001/libmethmod001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod001/methmod001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod002/libmethmod002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod002/methmod002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname001/libmethname001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname001/methname001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname002/libmethname002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname002/methname002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname003/libmethname003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname003/methname003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectHashCode/objhashcode001/libobjhashcode001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectHashCode/objhashcode001/objhashcode001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage001/libobjmonusage001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage001/objmonusage001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage002/libobjmonusage002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage002/objmonusage002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage003/libobjmonusage003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage003/objmonusage003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage004/libobjmonusage004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage004/objmonusage004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage005/libobjmonusage005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage005/objmonusage005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage006/libobjmonusage006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage006/objmonusage006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectSize/objsize001/libobjsize001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectSize/objsize001/objsize001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectsWithTags/objwithtags001/libobjwithtags001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectsWithTags/objwithtags001/objwithtags001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf001/libownmoninf001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf001/ownmoninf001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf002/libownmoninf002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf002/ownmoninf002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf003/libownmoninf003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf003/ownmoninf003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase001/getphase001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase001/libgetphase001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase002/getphase002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase002/libgetphase002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPotentialCapabilities/getpotcaps001/getpotcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPotentialCapabilities/getpotcaps001/libgetpotcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex001/libsrcdebugex001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex001/srcdebugex001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex002/libsrcdebugex002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex002/srcdebugex002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex003/libsrcdebugex003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex003/srcdebugex003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn004/getsrcfn004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn004/libgetsrcfn004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn005/getsrcfn005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn005/libgetsrcfn005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn006/getsrcfn006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn006/libgetsrcfn006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr001/getstacktr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr001/libgetstacktr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr002/getstacktr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr002/libgetstacktr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr003/getstacktr003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr003/libgetstacktr003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr004/getstacktr004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr004/libgetstacktr004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr005/getstacktr005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr005/libgetstacktr005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr006/getstacktr006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr006/libgetstacktr006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr007/getstacktr007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr007/libgetstacktr007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr008/getstacktr008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr008/libgetstacktr008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr009/getstacktr009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr009/libgetstacktr009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops001/getsysprops001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops001/libgetsysprops001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops002/getsysprops002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops002/libgetsysprops002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop001/getsysprop001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop001/libgetsysprop001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop002/getsysprop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop002/libgetsysprop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTag/gettag001/gettag001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTag/gettag001/libgettag001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/libthrcputime001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/thrcputime001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/libthrcputime002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/thrcputime002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/libthrtimerinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/thrtimerinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/getthrdgrpchld001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/libgetthrdgrpchld001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo001/libthrgrpinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo001/thrgrpinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo002/libthrgrpinfo002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo002/thrgrpinfo002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/libthrinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo002/libthrinfo002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo002/thrinfo002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadLocalStorage/getthrdstor001/getthrdstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadLocalStorage/getthrdstor001/libgetthrdstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat001/libthrstat001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat001/thrstat001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat002/libthrstat002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat002/thrstat002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat003/libthrstat003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat003/thrstat003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat004/libthrstat004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat004/thrstat004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat005/libthrstat005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat005/thrstat005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/gettime001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/libgettime001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/libtimerinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/timerinfo001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp001/libtopthrgrp001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp001/topthrgrp001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp002/libtopthrgrp002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp002/topthrgrp002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetVersionNumber/getvern001/getvern001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetVersionNumber/getvern001/libgetvern001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd001/intrpthrd001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd001/libintrpthrd001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd002/intrpthrd002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd002/libintrpthrd002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd003/intrpthrd003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd003/libintrpthrd003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray004/isarray004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray004/libisarray004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray005/isarray005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray005/libisarray005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin002/isfldsin002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin002/libisfldsin002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin003/isfldsin003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin003/libisfldsin003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf004/isintrf004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf004/libisintrf004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf005/isintrf005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf005/libisintrf005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative001/isnative001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative001/libisnative001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative002/isnative002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative002/libisnative002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodObsolete/isobsolete001/isobsolete001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodObsolete/isobsolete001/libisobsolete001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth001/issynth001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth001/libIsMethodSyntheticIssynth001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth002/issynth002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth002/libissynth002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap001/iterheap001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap001/libiterheap001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap002/iterheap002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap002/libiterheap002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap003/iterheap003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap003/libiterheap003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap004/iterheap004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap004/libiterheap004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap005/iterheap005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap005/libiterheap005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap006/iterheap006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap006/libiterheap006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap007/iterheap007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap007/libiterheap007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls001/iterinstcls001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls001/libiterinstcls001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls002/iterinstcls002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls002/libiterinstcls002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls003/iterinstcls003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls003/libiterinstcls003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls004/iterinstcls004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls004/libiterinstcls004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls005/iterinstcls005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls005/libiterinstcls005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls006/iterinstcls006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls006/libiterinstcls006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls007/iterinstcls007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls007/libiterinstcls007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj001/iterobjreachobj001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj001/libiterobjreachobj001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj002/iterobjreachobj002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj002/libiterobjreachobj002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj003/iterobjreachobj003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj003/libiterobjreachobj003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj004/iterobjreachobj004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj004/libiterobjreachobj004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj005/iterobjreachobj005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj005/libiterobjreachobj005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj001/iterreachobj001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj001/libiterreachobj001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj002/iterreachobj002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj002/libiterreachobj002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj003/iterreachobj003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj003/libiterreachobj003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj004/iterreachobj004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj004/libiterreachobj004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj005/iterreachobj005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj005/libiterreachobj005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/abort/Abort.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/abort/libAbort.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/libCallbacks.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/concrete-klass-filter/ConcreteKlassFilter.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/concrete-klass-filter/libConcreteKlassFilter.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/HeapFilter.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/libHeapFilter.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/non-concrete-klass-filter/NonConcreteKlassFilter.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/non-concrete-klass-filter/libNonConcreteKlassFilter.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/libmentry001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/mentry001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry002/libmentry002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry002/mentry002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/libmexit001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/mexit001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/libmexit002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/mexit002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEnter/mcontenter001/libmcontenter001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEnter/mcontenter001/mcontenter001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEntered/mcontentered001/libmcontentered001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEntered/mcontentered001/mcontentered001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWait/monitorwait001/libmonitorwait001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWait/monitorwait001/monitorwait001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWaited/monitorwaited001/libmonitorwaited001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWaited/monitorwaited001/monitorwaited001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/libnativemethbind001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind002/libnativemethbind002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind002/nativemethbind002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind003/libnativemethbind003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind003/nativemethbind003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind004/libnativemethbind004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind004/nativemethbind004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop001/libnframepop001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop001/nframepop001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop002/libnframepop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop002/nframepop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop003/libnframepop003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop003/nframepop003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/libobjfree001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/objfree001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/libobjfree002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/objfree002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe001/libpopframe001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe001/popframe001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe002/libpopframe002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe002/popframe002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe003/libpopframe003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe003/popframe003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe004/libpopframe004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe004/popframe004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe005/libpopframe005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe005/popframe005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe006/libpopframe006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe006/popframe006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe007/libpopframe007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe007/popframe007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe008/libpopframe008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe008/popframe008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe009/libpopframe009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe009/popframe009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe010/libpopframe010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe010/popframe010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe011/libpopframe011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe011/popframe011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/librawmonenter001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter002/librawmonenter002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter002/rawmonenter002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter003/librawmonenter003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter003/rawmonenter003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter004/librawmonenter004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter004/rawmonenter004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/librawmonexit001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit002/librawmonexit002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit002/rawmonexit002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit003/librawmonexit003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit003/rawmonexit003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit005/librawmonexit005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit005/rawmonexit005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/librawmnntfy001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy002/librawmnntfy002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy002/rawmnntfy002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy003/librawmnntfy003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy003/rawmnntfy003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy004/librawmnntfy004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy004/rawmnntfy004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/librawmnntfyall001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall002/librawmnntfyall002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall002/rawmnntfyall002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall003/librawmnntfyall003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall003/rawmnntfyall003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall004/librawmnntfyall004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall004/rawmnntfyall004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/librawmnwait001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait002/librawmnwait002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait002/rawmnwait002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait003/librawmnwait003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait003/rawmnwait003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait004/librawmnwait004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait004/rawmnwait004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait005/librawmnwait005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait005/rawmnwait005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/StressRedefine/libstressRedefine.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/StressRedefine/stressRedefine.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass001/libredefclass001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass001/redefclass001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass002/libredefclass002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass002/redefclass002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass003/libredefclass003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass003/redefclass003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass004/libredefclass004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass004/redefclass004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass005/libredefclass005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass005/redefclass005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass006/libredefclass006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass006/redefclass006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass008/libredefclass008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass008/redefclass008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass009/libredefclass009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass009/redefclass009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass010/libredefclass010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass010/redefclass010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass011/libredefclass011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass011/redefclass011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass012/libredefclass012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass012/redefclass012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass013/libredefclass013.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass013/redefclass013.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass014/libredefclass014.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass014/redefclass014.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass015/libredefclass015.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass015/redefclass015.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass016/libredefclass016.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass016/redefclass016.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass017/libredefclass017.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass017/redefclass017.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass018/libredefclass018.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass018/redefclass018.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass019/libredefclass019.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass019/redefclass019.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass020/libredefclass020.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass020/redefclass020.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass021/libredefclass021.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass021/redefclass021.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass022/libredefclass022.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass022/redefclass022.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass023/libredefclass023.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass023/redefclass023.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass024/libredefclass024.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass024/redefclass024.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass025/libredefclass025.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass025/redefclass025.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass026/libredefclass026.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass026/redefclass026.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/libredefclass027.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass028/libredefclass028.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass028/redefclass028.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass029/libredefclass029.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass029/redefclass029.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass030/libredefclass030.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass030/redefclass030.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass031/libredefclass031.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass031/redefclass031.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps001/librelcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps001/relcaps001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps002/librelcaps002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps002/relcaps002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResourceExhausted/libresexhausted.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResourceExhausted/resexhausted.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd001/libresumethrd001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd001/resumethrd001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd002/libresumethrd002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd002/resumethrd002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/libresumethrdlst001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/resumethrdlst001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/libresumethrdlst002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/resumethrdlst002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform002/libretransform002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform002/retransform002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/libretransform003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/libretransform004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/retransform004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr001/agentthr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr001/libagentthr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr002/agentthr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr002/libagentthr002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr003/agentthr003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr003/libagentthr003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk002/libsetbrk002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk002/setbrk002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk003/libsetbrk003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk003/setbrk003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk005/libsetbrk005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk005/setbrk005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk007/libsetbrk007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk007/setbrk007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk008/libsetbrk008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk008/setbrk008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/libsetenvstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/setenvstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/libsetenvstor002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/setenvstor002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/libsetenvstor003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/setenvstor003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb001/libsetevntcallb001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb001/setevntcallb001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb002/libsetevntcallb002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb002/setevntcallb002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb003/libsetevntcallb003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb003/setevntcallb003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/libsetnotif001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetExtensionEventCallback/setextevent001/libsetextevent001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetExtensionEventCallback/setextevent001/setextevent001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/libsetfldw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw002/libsetfldw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw002/setfldw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/libsetfldw003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/setfldw003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/libsetfldw004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/setfldw004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw005/libsetfldw005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw005/setfldw005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw006/libsetfldw006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw006/setfldw006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/libsetfmodw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw002/libsetfmodw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw002/setfmodw002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/libsetfmodw003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/setfmodw003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/libsetfmodw004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/setfmodw004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw005/libsetfmodw005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw005/setfmodw005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw006/libsetfmodw006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw006/setfmodw006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab001/libsetjniftab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab001/setjniftab001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab002/libsetjniftab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab002/setjniftab002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal001/libsetlocal001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal001/setlocal001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal002/libsetlocal002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal002/setlocal002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal003/libsetlocal003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal003/setlocal003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/libsetlocal004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/setlocal004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix001/SetNativeMethodPrefix001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix001/libSetNativeMethodPrefix001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/SetNativeMethodPrefix002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/SetNativeMethodPrefix002Main.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/libSetNativeMethodPrefix002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/libSetNativeMethodPrefix002Main.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop002/libsetsysprop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop002/setsysprop002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop003/libsetsysprop003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop003/setsysprop003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetTag/settag001/libsettag001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetTag/settag001/settag001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/libsetthrdstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/setthrdstor001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/libsetthrdstor002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/setthrdstor002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/libsetthrdstor003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/setthrdstor003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag001/libsetvrbflag001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag001/setvrbflag001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag002/libsetvrbflag002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag002/setvrbflag002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep001/libsinglestep001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep001/singlestep001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep002/libsinglestep002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep002/singlestep002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep003/libsinglestep003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep003/singlestep003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd006/libstopthrd006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd006/stopthrd006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd007/libstopthrd007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd007/stopthrd007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd001/libsuspendthrd001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd001/suspendthrd001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd002/libsuspendthrd002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd002/suspendthrd002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd003/libsuspendthrd003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd003/suspendthrd003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/libsuspendthrdlst001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/suspendthrdlst001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/libsuspendthrdlst002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/suspendthrdlst002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/libthreadend001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend002/libthreadend002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend002/threadend002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/libthreadstart001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart002/libthreadstart002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart002/threadstart002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart003/libthreadstart003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart003/threadstart003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMDeath/vmdeath001/libvmdeath001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMDeath/vmdeath001/vmdeath001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMInit/vminit001/libvminit001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMInit/vminit001/vminit001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMObjectAlloc/vmobjalloc001/libvmobjalloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMObjectAlloc/vmobjalloc001/vmobjalloc001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP01/ap01t001/ap01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP01/ap01t001/libap01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP02/ap02t001/ap02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP02/ap02t001/libap02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP03/ap03t001/ap03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP03/ap03t001/libap03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t001/ap04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t001/libap04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t002/ap04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t002/libap04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t003/ap04t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t003/libap04t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t001/ap05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t001/libap05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t002/ap05t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t002/libap05t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP06/ap06t001/ap06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP06/ap06t001/libap06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t001/ap07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t001/libap07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t002/ap07t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t002/libap07t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP09/ap09t001/ap09t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP09/ap09t001/libap09t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/ap10t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/libap10t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP11/ap11t001/ap11t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP11/ap11t001/libap11t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP12/ap12t001/ap12t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP12/ap12t001/libap12t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t001/bi01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t001/libbi01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t002/bi01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t002/libbi01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t001/bi02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t001/libbi02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t002/bi02t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t002/libbi02t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t001/bi03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t001/libbi03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t002/bi03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t002/libbi03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/libbi04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t001/cm01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t001/libcm01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t002/cm01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t002/libcm01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t003/cm01t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t003/libcm01t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t004/cm01t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t004/libcm01t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t005/cm01t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t005/libcm01t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t006/cm01t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t006/libcm01t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t007/cm01t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t007/libcm01t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/cm01t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/libcm01t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t009/cm01t009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t009/libcm01t009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t010/cm01t010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t010/libcm01t010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t011/cm01t011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t011/libcm01t011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t012/cm01t012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t012/libcm01t012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t013/cm01t013.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t013/libcm01t013.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t014/cm01t014.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t014/libcm01t014.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t015/cm01t015.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t015/libcm01t015.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t016/cm01t016.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t016/libcm01t016.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t017/cm01t017.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t017/libcm01t017.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t018/cm01t018.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t018/libcm01t018.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t019/cm01t019.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t019/libcm01t019.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t020/cm01t020.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t020/libcm01t020.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t021/cm01t021.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t021/libcm01t021.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/cm02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/libcm02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/cm03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/libcm03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC01/tc01t001/libtc01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC01/tc01t001/tc01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC02/tc02t001/libtc02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC02/tc02t001/tc02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t001/libtc03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t001/tc03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t002/libtc03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t002/tc03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC04/tc04t001/libtc04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC04/tc04t001/tc04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/libtc05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t001/em01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t001/libem01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t002/em01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t002/libem01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t001/em02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t001/libem02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t002/em02t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t002/libem02t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t003/em02t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t003/libem02t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t004/em02t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t004/libem02t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t005/em02t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t005/libem02t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t006/em02t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t006/libem02t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t007/em02t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t007/libem02t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t008/em02t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t008/libem02t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t009/em02t009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t009/libem02t009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t010/em02t010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t010/libem02t010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t011/em02t011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t011/libem02t011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t012/em02t012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t012/libem02t012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/libem04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/libem05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/libem05t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM06/em06t001/em06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM06/em06t001/libem06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t001/em07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t001/libem07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/libem07t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/extension/EX03/ex03t001/ex03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/extension/EX03/ex03t001/libex03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/gf01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/libgf01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF04/gf04t001/gf04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF04/gf04t001/libgf04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/gf06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/libgf06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t001/gf08t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t001/libgf08t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t002/gf08t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t002/libgf08t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t003/gf08t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t003/libgf08t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/hs103t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/libhs103t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/hs104t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/libhs104t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/hs104t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/libhs104t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/libhs201t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/libhs201t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t003/hs201t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t003/libhs201t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t001/hs202t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t001/libhs202t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/hs202t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/libhs202t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/hs203t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/libhs203t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/hs203t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/libhs203t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/hs203t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/libhs203t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/hs203t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/libhs203t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/libhs204t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/libhs204t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/hs204t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/libhs204t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/hs204t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/libhs204t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/hs301t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/libhs301t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/hs301t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/libhs301t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/hs301t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/libhs301t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/hs301t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/libhs301t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/hs301t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/libhs301t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/hs302t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/libhs302t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/hs302t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/libhs302t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/hs302t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/libhs302t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/hs302t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/libhs302t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/hs302t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/libhs302t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/hs302t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/libhs302t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/hs302t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/libhs302t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/hs302t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/libhs302t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/hs302t009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/libhs302t009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/hs302t010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/libhs302t010.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/hs302t011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/libhs302t011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/hs302t012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/libhs302t012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI01/ji01t001/ji01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI01/ji01t001/libji01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t001/ji03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t001/libji03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t002/ji03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t002/libji03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t003/ji03t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t003/libji03t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t004/ji03t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t004/libji03t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI05/ji05t001/ji05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI05/ji05t001/libji05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI06/ji06t001/ji06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI06/ji06t001/libji06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/libma01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/libma01t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/ma01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/ma01t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/libma02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/libma02t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/ma02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/ma02t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/libma03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/libma03t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/ma03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/ma03t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/libma04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/libma04t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/libma04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/libma04t002a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/libma04t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/libma04t003a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/libma05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/libma05t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/ma05t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/ma05t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/libma06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/libma06t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/libma07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/libma07t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/libma08t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/libma08t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/ma08t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/ma08t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/libma10t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/libma10t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/ma10t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/ma10t001a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/libma10t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/libma10t002a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/ma10t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/ma10t002a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/libma10t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/libma10t003a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/ma10t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/ma10t003a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/libma10t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/libma10t004a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/libma10t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/libma10t005a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/ma10t005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/ma10t005a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/libma10t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/libma10t006a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/ma10t006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/ma10t006a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/libma10t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/libma10t007a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/ma10t007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/ma10t007a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/libma10t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/libma10t008a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/ma10t008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/ma10t008a.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t001/libsp01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t001/sp01t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t002/libsp01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t002/sp01t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t003/libsp01t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t003/sp01t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/libsp02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/sp02t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/libsp02t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/libsp02t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t001/libsp03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t001/sp03t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t002/libsp03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t002/sp03t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t001/libsp04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t001/sp04t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t002/libsp04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t002/sp04t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t002/libsp05t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t002/sp05t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t003/libsp05t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t003/sp05t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/libsp06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/libsp06t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/libsp06t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/libsp07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/libsp07t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref001/followref001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref001/libfollowref001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref002/followref002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref002/libfollowref002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref003/followref003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref003/libfollowref003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref004/followref004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref004/libfollowref004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref005/followref005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref005/libfollowref005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref006/followref006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref006/libfollowref006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretbase/earlyretbase.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretbase/libearlyretbase.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/libearlyretfp.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/libearlyretint.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretlong/earlyretlong.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretlong/libearlyretlong.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretobj/earlyretobj.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretobj/libearlyretobj.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretstr/earlyretstr.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretstr/libearlyretstr.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretvoid/earlyretvoid.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretvoid/libearlyretvoid.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/libgetallstktr001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetConstantPool/getcpool001/getcpool001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetConstantPool/getcpool001/libgetcpool001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLineNumberTable/linetab004/liblinetab004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLineNumberTable/linetab004/linetab004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal003/getlocal003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal003/libgetlocal003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal004/getlocal004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal004/libgetlocal004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/IsSynthetic/issynth001/issynth001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/IsSynthetic/issynth001/libIsSyntheticIssynth001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/libMethodBind.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/OnUnload/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/OnUnload/JvmtiTest/libOnUnload.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/libStackTrace.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/agentthr/agentthr.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/agentthr/libagentthr.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/clsldrclss00x/clsldrclss00x.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/clsldrclss00x/libclsldrclss00x.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/libredefineCFLH.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/extmech/extmech.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/extmech/libextmech.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/libAddToBootstrapClassLoaderSearch.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/libDispose.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/libgc.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/libenvironment.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/libnosuspendMonitorInfo.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/libnosuspendStackTrace.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/librawmonitor.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/heapref.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/libheapref.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/librefignore.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/refignore.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/libsetNullVMInit.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/libtimers.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/StackTraceController.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/ThreadController.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/libStackTraceController.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/libThreadController.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/Deadlock.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/LockingThreads.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/RecursiveMonitoringThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libDeadlock.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libLockingThreads.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libNativeBlockedThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libRecursiveMonitoringThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMDITools.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMDITools.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/aod/aod.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/aod/aod.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/BooleanArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/ByteArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/CharArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/DoubleArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/FloatArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/IntArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/LongArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/ShortArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/StringCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libBooleanArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libByteArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libCharArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libDoubleArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libFloatArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libIntArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libLongArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libShortArrayCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libStringCriticalLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIGlobalRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNILocalRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIWeakGlobalRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIGlobalRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNILocalRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIWeakGlobalRefLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jvmti/JVMTIAllocLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jvmti/libJVMTIAllocLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/malloc/MallocLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/malloc/libMallocLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jdi/MonitorEnterExecutor.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jdi/libMonitorEnterExecutor.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/JNIreferences.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/libJNIreferences.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jpda/libNativeMethodsTestThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/libbootclssearch_agent.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/libsystemclssearch_agent.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_common/agent_common.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_common/agent_common.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_tools.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/libHotSwap.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/unit/Heap.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/unit/libHeap.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/JNIMonitorLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/LockingThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/libJNIMonitorLocker.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/libLockingThread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_thread.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_thread.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_utils.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_list.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_list.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/gclocker/libgcl001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/jnihelper.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress002.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress007.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace014.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace015.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/nsk_strace.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace003.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace004.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace005.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace006.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace008.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace009.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace011.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace012.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace014.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace015.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/share/IndyRedefineClass.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/share/libIndyRedefineClass.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/stepBreakPopReturn/libstepBreakPopReturn.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/stepBreakPopReturn/stepBreakPopReturn.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/meth/stress/jni/nativeAndMH/libnativeAndMH.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/meth/stress/jni/nativeAndMH/nativeAndMH.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/runtime/defmeth/shared/libredefineClasses.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/runtime/defmeth/shared/redefineClasses.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c
Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/libProcessUtils.c

FINAL RESULTS:

data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:236:19:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:240:21:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:215:19:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:220:21:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:216:19:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:220:21:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:630:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod(_full_path, _S_IREAD | _S_IWRITE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:179:23:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        if ((cmdlen = readlink(fn, cmdline, PATH_MAX)) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:495:5:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
    strncat(jvm_cfg, "/lib/jvm.cfg", MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:692:16:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    if ((ret = readlink(fn, exePath, PATH_MAX - 1)) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:307:20:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        if ((len = readlink(DEFAULT_ZONEINFO_FILE, linkbuf, sizeof(linkbuf)-1)) == -1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:217:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(path, mode) >= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:449:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(path, mode & ~(S_IWUSR | S_IWGRP | S_IWOTH)) >= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:669:19:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        int len = readlink(self, buf, PATH_MAX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:631:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(chmod(path, (mode_t)mode), err);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:657:17:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    RESTARTABLE(chown(path, (uid_t)uid, (gid_t)gid), err);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:917:13:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    int n = readlink(path, target, sizeof(target));
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:141:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(out + (p - in), "%s%s", rep, p + sub_len);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:266:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(files_to_delete[num_files_to_delete], name);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:270:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(atname+1, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:959:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  void system(int op0, int op1, int CRn, int CRm, int op2,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:973:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b0010, 0b0000, imm);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1030:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b00011, imm, 0b100);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1034:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b00011, imm, 0b101);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1038:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b00011, SY, 0b110);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1043:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b01, op1, CRn, CRm, op2, rt);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:61:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:62:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType bt = access.type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:63:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:64:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:66:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:66:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:66:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:75:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      LIR_Opr addr = access.resolved_addr()->as_address_ptr()->base();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:82:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:85:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:86:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:87:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:93:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:94:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:94:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:94:86:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:99:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  __ xchg(access.resolved_addr(), value_opr, result, tmp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:101:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:102:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    result = load_reference_barrier(access.gen(), result, LIR_OprFact::addressConst(0));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:107:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:107:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:107:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1483:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), "0x%"PRIX64, imm64);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1546:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), "0x%"PRIX64, imm64);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1659:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer, sizeof(buffer), "0x%"PRIX32, imm32);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interp_masm_arm.cpp:1900:35:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  InlinedAddress Lprintf((address)printf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:56:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(reg&1 ? "H" : "L");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:197:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(LP64 ? "LP64 " : "LP32 ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:198:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(LONGS_IN_ONE_ENTRY ? "long1: " : "long2: ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:278:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(LP64 ? "LP64 " : "LP32 ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:279:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(LONGS_IN_ONE_ENTRY ? "long1: " : "long2: ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:70:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:72:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:73:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:75:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:75:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:75:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:84:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      LIR_Opr addr = access.resolved_addr()->as_address_ptr()->base();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:91:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:94:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:95:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:96:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:102:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:103:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:103:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:103:86:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:110:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  __ xchg(access.resolved_addr(), result, result, LIR_OprFact::illegalOpr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:112:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:113:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    result = load_reference_barrier(access.gen(), result, LIR_OprFact::addressConst(0));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:118:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:118:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:118:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:207:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(valuebuf, buflen, PTR_FORMAT, *addr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:285:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(valuebuf, buflen, PTR_FORMAT " (bci %d)",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:224:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(addr.sun_path, initial_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp:182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pci->description, psct.description);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp:246:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ppi->name, pspt.name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp:296:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pwi->name, pswt.name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/misc_aix.hpp:40:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, fmt, ##__VA_ARGS__); \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:589:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(ld_library_path, "%s%s" DEFAULT_LIBPATH, v, v_colon);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:594:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" EXTENSIONS_DIR, Arguments::get_java_home());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1584:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1633:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1637:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 == access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:257:13:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        n = vsscanf(tmp, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:575:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, p->pw_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:630:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:632:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:665:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:667:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:691:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(oldest_user, user);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:1194:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:204:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(addr.sun_path, initial_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:417:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(ld_library_path, "%s%s" SYS_EXT_DIR "/lib/%s:" DEFAULT_LIBPATH, v, v_colon, cpu_arch);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:423:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:510:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(ld_library_path, "%s%s%s%s%s" SYS_EXTENSIONS_DIR ":" SYS_EXTENSIONS_DIRS ":.",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:521:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" SYS_EXTENSIONS_DIR ":%s" EXTENSIONS_DIR ":" SYS_EXTENSIONS_DIRS,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1727:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1783:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1791:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1798:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 == access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:329:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(path, buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:491:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, p->pw_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:548:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:550:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:571:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:573:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:597:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(oldest_user, user);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:1106:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:205:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(addr.sun_path, initial_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:191:23:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        int matched = sscanf(p, scan_fmt, returnval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:197:25:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          int matched = sscanf(p, scan_fmt, discard, returnval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:321:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(p, "%*d %*d %*d:%*d %s %s %*[^-]- cgroup %*s %s", tmproot, tmpmount, tmpcgroups) != 3) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:478:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(ld_library_path, "%s%s" SYS_EXT_DIR "/lib:" DEFAULT_LIBPATH, v, v_colon);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:484:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1160:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        i = sscanf(s, "%c %d %d %d %d %d %lu %lu %lu %lu %lu %lu %lu %ld %ld %ld %ld %ld %ld " _UFM _UFM _DFM _UFM _UFM _UFM _UFM,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2059:21:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      int matches = sscanf(line, UINT64_FORMAT_X "-" UINT64_FORMAT_X " %*s %*s %*s " INT64_FORMAT " %s",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2577:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2633:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2637:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 == access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:252:13:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        n = vsscanf(tmp, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:410:11:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (vsscanf(line, fmt, args) == 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:504:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, p->pw_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:574:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:576:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:609:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:611:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:635:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(oldest_user, user);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:1188:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:345:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int os::vsnprintf(char* buf, size_t len, const char* fmt, va_list args) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:347:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = ::vsnprintf(buf, len, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:649:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(agent_entry_name, sym_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1438:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(outbuf, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:643:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(common_path, SYS_EXT_DIR "/lib");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:660:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(library_path, common_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:667:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(library_path, common_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:668:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(library_path, os::path_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:671:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(library_path, path->dls_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:672:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(library_path, os::path_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:690:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1953:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2003:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2007:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 == access(buf, F_OK)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:479:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, p->pw_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:536:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:538:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:571:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:573:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:597:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(oldest_user, user);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:1133:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:219:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(home_path, home_dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:228:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dll_path, home_dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:229:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(dll_path, bin);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:263:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:267:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:268:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, PACKAGE_DIR BIN_DIR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:272:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:276:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:280:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(library_path, path_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:294:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s%s;%s%s%s", Arguments::get_java_home(), EXT_DIR,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1138:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dirp->path, dirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1181:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dirp->dirent.d_name, dirp->find_data.cFileName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1538:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int os::vsnprintf(char* buf, size_t len, const char* fmt, va_list args) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1541:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = ::vsnprintf(buf, len, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1873:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4943:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    base = (char*)MapViewOfFileEx(hMap, access, 0, (DWORD)file_offset,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5335:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(cmd_string, cmd_prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5336:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(cmd_string, cmd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5603:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(agent_entry_name, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5606:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(agent_entry_name, sym_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5611:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(agent_entry_name, sym_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:288:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, user);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:331:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:333:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:364:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:366:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:400:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(latest_user, user);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:489:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(path, dirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:491:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(path, filename);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1642:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1643:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(robjectname, objectname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:252:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, directory);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp:250:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, fmt, sig, info->si_addr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:280:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access(ZFILENAME_SHMEM_ENABLED, R_OK) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.cpp:60:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access(line_mountpoint, R_OK|W_OK|X_OK) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.cpp:76:22:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  const int result = fscanf(file, SIZE_FORMAT, &actual_max_map_count);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlc.hpp:54:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlc.hpp:54:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:214:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buf, "%s_%d", instr->_ident, match_rules_cnt++);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2862:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(ec_name, "%s%s", prefix, inst._ident);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3333:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(ec_name, "%s%s", prefix, inst._ident);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4466:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result, location);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4467:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(result, cppBlock);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4468:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(result, end_loc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4555:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(result, location);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4556:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(result, token2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4557:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(result, end_loc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4653:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "(%s)", param);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5261:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(location, "\n#line %d \"%s\"\n", line, file);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:788:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(errfile, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:813:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(regMask,"%s%s()", rc_name, mask);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:906:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(result,"%s%s", stack_or, reg_mask_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:218:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(Expr::buffer(), "_kids[0]->_cost[%s]", lchild_to_upper);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:224:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(Expr::buffer(), "_kids[1]->_cost[%s]", rchild_to_upper);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1538:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(s,"/*%s*/(",(char*)i._key);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3464:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(subtree,"_%s_%s_%s", _opType, lstr, rstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3881:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "%s_%d", instr_ident, match_rules_cnt++);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:460:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s",base,suffix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:214:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    templen += sprintf(&operand_stages[templen], "  stage_%s%c\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:288:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    templen += sprintf(&resource_stages[templen], "  stage_%s%-*s // %s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:361:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    templen += sprintf(&resource_cycles[templen], "  %*d%c // %s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:459:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(&resource_mask[templen], "  %s(0x%0*x, %*d, %*d, %s %s(",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:499:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(&resource_mask[templen], "0x%08x%s", res_mask[j], j > 0 ? ", " : "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2527:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ib += sprintf(ib, "  unsigned idx_%-5s = mach_constant_base_node_input(); \t// %s, \t%s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2529:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      nb += sprintf(nb, "  Node    *n_%-7s = lookup(idx_%s);\n", name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2536:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ib += sprintf(ib, "  unsigned idx_%-5s = idx%d; \t// %s, \t%s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2538:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      nb += sprintf(nb, "  Node    *n_%-7s = lookup(idx_%s);\n", name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2539:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ob += sprintf(ob, "  %sOper *op_%s = (%sOper *)opnd_array(%d);\n", type, name, type, idx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:310:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fp,is_ideal_bool ? "BoolTest::mask c%d" : "int32_t c%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1619:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type, patch_info, load_emit_info);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1620:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1621:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->BarrierSetC1::load_at(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1623:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->load_at(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1630:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, LIR_OprFact::illegalOpr, LIR_OprFact::illegalOpr, type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1631:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(addr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1632:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1633:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->BarrierSetC1::load(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1635:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->load(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1643:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type, patch_info, store_emit_info);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1644:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1645:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->BarrierSetC1::store_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1647:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->store_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1657:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1658:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1659:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC1::atomic_cmpxchg_at(access, cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1661:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_cmpxchg_at(access, cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1671:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1672:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1673:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC1::atomic_xchg_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1675:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_xchg_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1685:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1686:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1687:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC1::atomic_add_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1689:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_add_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:198:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (sscanf(_bufptr, INTPTR_FORMAT "%n", &v, &read) != 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:846:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (sscanf(string_value, JLONG_FORMAT, &value) != 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:255:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(copy, dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:299:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(copy, zip_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1853:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig_copy, orig);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp:64:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(name_copy, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2214:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "\tat %s.%s(", klass_name, method_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2219:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf + (int)strlen(buf), "%s@%s/", module_name, module_version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2221:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf + (int)strlen(buf), "%s/", module_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2236:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf + (int)strlen(buf), "%s:%d)", source_file_name, line_number);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2239:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf + (int)strlen(buf), "%s)", source_file_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:876:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name_buffer, "%s CompilerThread%d", _compilers[1]->name(), i);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:956:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name_buffer, "%s CompilerThread%d", _compilers[1]->name(), i);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:50:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char*)_file, file_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:94:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[jvm_offset], hsdis_library_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:95:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(&buf[jvm_offset], os::dll_file_extension());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:99:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(&buf[lib_offset], hsdis_library_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:100:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(&buf[lib_offset], os::dll_file_extension());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:109:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&buf[lib_offset], hsdis_library_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:110:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(&buf[lib_offset], os::dll_file_extension());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:117:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[0], hsdis_library_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:118:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(&buf[0], os::dll_file_extension());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:181:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fillp, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.cpp:45:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp:56:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:51:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void G1BarrierSetC1::pre_barrier(LIRAccess& access, LIR_Opr addr_opr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:53:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:54:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:110:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void G1BarrierSetC1::post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:111:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:112:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:178:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void G1BarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:179:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:183:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:185:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::load_at_resolved(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:187:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop() && (is_weak || is_phantom || is_anonymous)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:192:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      generate_referent_check(access, Lcont_anonymous);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:194:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, LIR_OprFact::illegalOpr /* addr_opr */,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:195:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                result /* pre_val */, access.patch_emit_info() /* info */);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:121:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void pre_barrier(LIRAccess& access, LIR_Opr addr_opr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:123:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:125:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:595:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* G1BarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:596:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:597:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:599:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:600:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* obj = access.base();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:610:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load = CardTableBarrierSetC2::load_at_resolved(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:621:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop() || !need_read_barrier) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.hpp:85:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.cpp:46:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.cpp:43:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.cpp:43:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:41:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:42:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:46:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRItem& base = access.base().item();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:47:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr offset = access.offset().opr();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:48:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:52:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    addr_opr = LIR_OprFact::address(gen->emit_array_address(base.result(), offset, access.type()));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:58:82:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    addr_opr = LIR_OprFact::address(new LIR_Address(base.result(), PATCHED_ADDR, access.type()));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:60:88:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    addr_opr = LIR_OprFact::address(gen->generate_address(base.result(), offset, 0, 0, access.type()));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:66:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      __ leal(addr_opr, resolved_addr, lir_patch_normal, access.patch_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:67:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.clear_decorators(C1_NEEDS_PATCHING);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:71:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return LIR_OprFact::address(new LIR_Address(resolved_addr, access.type()));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:77:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::store_at(LIRAccess& access, LIR_Opr value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:78:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:82:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, false);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:83:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:84:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  store_at_resolved(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:87:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::load_at(LIRAccess& access, LIR_Opr result) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:88:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:92:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, false);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:93:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:94:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_at_resolved(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:97:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::load(LIRAccess& access, LIR_Opr result) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:98:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:101:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_at_resolved(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:104:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_cmpxchg_at(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:105:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:109:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.load_address();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:111:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:112:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:113:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:116:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_xchg_at(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:117:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:121:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.load_address();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:123:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:124:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:125:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_xchg_at_resolved(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:128:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_add_at(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:129:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:133:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.load_address();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:135:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:136:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:137:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_add_at_resolved(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:140:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:141:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:145:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:148:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = gen->mask_boolean(access.base().opr(), value, access.access_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:148:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = gen->mask_boolean(access.base().opr(), value, access.access_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:157:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:157:80:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:159:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info(), patch_code);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:159:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info(), patch_code);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:167:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:168:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:169:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:181:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ move_wide(access.resolved_addr()->as_address_ptr(), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:183:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:183:80:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:185:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info(), patch_code);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:185:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info(), patch_code);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:202:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:203:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:204:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_cmpxchg(access.type(), access.resolved_addr(), cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:204:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_cmpxchg(access.type(), access.resolved_addr(), cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:207:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:208:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:209:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_xchg(access.type(), access.resolved_addr(), value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:209:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_xchg(access.type(), access.resolved_addr(), value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:212:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_add_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:213:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:214:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_add(access.type(), access.resolved_addr(), value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:214:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_add(access.type(), access.resolved_addr(), value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:217:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::generate_referent_check(LIRAccess& access, LabelObj* cont) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:238:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:240:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRItem& base = access.base().item();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:241:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr offset = access.offset().opr();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:115:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:117:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void generate_referent_check(LIRAccess& access, LabelObj* cont);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:120:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at_resolved(LIRAccess& access, LIR_Opr value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:121:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:123:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:125:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:126:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_add_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:129:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at(LIRAccess& access, LIR_Opr value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:130:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at(LIRAccess& access, LIR_Opr result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:131:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load(LIRAccess& access, LIR_Opr result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:133:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:135:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at(LIRAccess& access, LIRItem& value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:136:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_add_at(LIRAccess& access, LIRItem& value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:37:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void CardTableBarrierSetC1::post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:38:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:39:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.hpp:32:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:35:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ModRefBarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:36:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:40:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:41:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:41:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:42:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                LIR_OprFact::illegalOpr /* pre_val */, access.patch_emit_info());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:45:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::store_at_resolved(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:47:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:49:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIR_Opr post_addr = precise ? access.resolved_addr() : access.base().opr();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:49:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIR_Opr post_addr = precise ? access.resolved_addr() : access.base().opr();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:50:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, post_addr, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:54:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ModRefBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:55:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:56:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:56:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:60:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr result = BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:62:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:63:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), new_value.result());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:63:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), new_value.result());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:69:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ModRefBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:70:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:71:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:71:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:75:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr result = BarrierSetC1::atomic_xchg_at_resolved(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:77:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:78:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), value.result());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:78:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), value.result());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:86:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ModRefBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:87:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:93:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_in_register |= !needs_patching && is_write && access.is_oop() && precise;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:94:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::resolve_address(access, resolve_in_register);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:36:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void pre_barrier(LIRAccess& access, LIR_Opr addr_opr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:38:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:41:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:43:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at_resolved(LIRAccess& access, LIR_Opr value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:45:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:47:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:36:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC2::resolve_address(C2Access& access) const { }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:71:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:72:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:73:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:83:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == T_DOUBLE) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:88:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:90:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* store = kit->store_to_memory(kit->control(), access.addr().node(), val.node(), access.type(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:90:88:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* store = kit->store_to_memory(kit->control(), access.addr().node(), val.node(), access.type(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:91:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                     access.addr().type(), mo, requires_atomic_access, unaligned, mismatched, unsafe);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:92:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(store);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:96:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:97:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:98:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:100:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:101:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:112:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:118:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    load = kit->make_load(control, adr, val_type, access.type(), mo);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:120:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    load = kit->make_load(control, adr, val_type, access.type(), adr_type, mo,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:124:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:134:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence(C2Access& access) :
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:135:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _access(access), _leading_membar(NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:136:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:137:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:178:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access.needs_cpu_membar()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:186:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.set_memory();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:235:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::store_at(C2Access& access, C2AccessValue& val) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:236:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:237:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:238:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return store_at_resolved(access, val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:241:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::load_at(C2Access& access, const Type* val_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:242:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:243:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:244:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return load_at_resolved(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:316:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static void pin_atomic_op(C2AtomicAccess& access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:317:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.needs_pinning()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:323:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:324:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load_store = access.raw_access();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:327:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  kit->set_memory(proj, access.alias_idx());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:335:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:337:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:338:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:339:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:341:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:342:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:346:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:358:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:380:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:381:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:384:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop() && adr->bottom_type()->is_ptr_to_narrowoop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:392:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:394:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:395:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:396:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:397:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:400:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:402:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:422:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch(access.type()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:460:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:461:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:466:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:467:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:468:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:469:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:470:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:473:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:484:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:502:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:503:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:506:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop() && adr->bottom_type()->is_ptr_to_narrowoop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:514:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_add_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:516:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:517:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:518:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:519:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:521:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch(access.type()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:538:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:539:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:544:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_val_at(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:546:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:547:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:548:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:551:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_bool_at(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:553:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:554:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:555:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:558:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_xchg_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:559:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:560:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:561:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_xchg_at_resolved(access, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:564:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_add_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:565:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:566:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:567:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_add_at_resolved(access, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:168:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void resolve_address(C2Access& access) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:169:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:170:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:172:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:174:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:176:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:177:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_add_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:181:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at(C2Access& access, C2AccessValue& val) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:182:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at(C2Access& access, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:184:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:186:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:188:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:189:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_add_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:33:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:34:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:35:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:37:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:38:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:45:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop() || (!in_heap && !anonymous)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:46:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::store_at_resolved(access, val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:52:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pre_barrier(kit, true /* do_load */, kit->control(), access.base(), adr, adr_idx, val.node(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:53:79:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              static_cast<const TypeOopPtr*>(val.type()), NULL /* pre_val */, access.type());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:54:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* store = BarrierSetC2::store_at_resolved(access, val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:55:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), adr, adr_idx, val.node(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:55:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), adr, adr_idx, val.node(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:56:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.type(), use_precise);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:61:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:63:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:65:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:66:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:73:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:75:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:75:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:76:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:76:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:81:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:83:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:85:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:86:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:93:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load_store = BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:108:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(kit, ideal.ctrl(), access.raw_access(), access.base(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:108:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(kit, ideal.ctrl(), access.raw_access(), access.base(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:109:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                 access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:109:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                 access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:117:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:118:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:120:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:121:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:131:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:131:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:131:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:132:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:55:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:57:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:59:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:61:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.cpp:40:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.cpp:40:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.cpp:45:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp:714:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dup, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:179:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ShenandoahBarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:180:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:81:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:78:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:186:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::store_at_resolved(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:189:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:193:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = access.is_oop() && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:193:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = access.is_oop() && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:194:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::resolve_address(access, resolve_in_register || patch_before_barrier);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:197:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ShenandoahBarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:199:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:200:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    BarrierSetC1::load_at_resolved(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:204:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:205:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:206:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:211:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    BarrierSetC1::load_at_resolved(access, tmp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:212:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    tmp = load_reference_barrier(gen, tmp, access.resolved_addr());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:215:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    BarrierSetC1::load_at_resolved(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:220:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:229:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        generate_referent_check(access, Lcont_anonymous);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:231:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), decorators, LIR_OprFact::illegalOpr /* addr_opr */,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:217:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at_resolved(LIRAccess& access, LIR_Opr value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:218:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:219:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:221:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:223:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:497:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:498:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:500:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:501:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:506:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop() || (!on_heap && !anonymous)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:507:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::store_at_resolved(access, val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:510:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:517:77:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  shenandoah_write_barrier_pre(kit, true /* do_load */, /*kit->control(),*/ access.base(), adr, adr_idx, val.node(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:518:96:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               static_cast<const TypeOopPtr*>(val.type()), NULL /* pre_val */, access.type());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:519:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::store_at_resolved(access, val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:522:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:524:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:525:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::load_at_resolved(access, val_type);;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:528:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load = BarrierSetC2::load_at_resolved(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:529:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:530:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:535:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    load = access.kit()->gvn().transform(load);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:541:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:543:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* obj = access.base();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:558:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:581:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static void pin_atomic_op(C2AtomicAccess& access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:582:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.needs_pinning()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:588:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:589:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load_store = access.raw_access();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:592:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  kit->set_memory(proj, access.alias_idx());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:595:78:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:597:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:598:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:604:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:605:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* mem = access.memory();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:606:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:607:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const TypePtr* adr_type = access.addr().type();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:629:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.set_raw_access(load_store);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:630:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pin_atomic_op(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:640:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:643:79:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:645:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:646:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:651:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:652:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:653:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* mem = access.memory();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:656:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:691:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.set_raw_access(load_store);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:692:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pin_atomic_op(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:695:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:698:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* val, const Type* value_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:699:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:700:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:703:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:704:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:84:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:85:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:86:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:88:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:90:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp:42:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:34:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ZLoadBarrierStubC1::ZLoadBarrierStubC1(LIRAccess& access, LIR_Opr ref, address runtime_stub) :
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:35:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _decorators(access.decorators()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:36:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _ref_addr(access.resolved_addr()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:47:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      _tmp = access.gen()->new_pointer_register();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:126:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static bool barrier_needed(LIRAccess& access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:127:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return ZBarrierSet::barrier_needed(access.decorators(), access.type());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:127:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return ZBarrierSet::barrier_needed(access.decorators(), access.type());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:146:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define __ access.gen()->lir(__FILE__, __LINE__)->
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:148:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define __ access.gen()->lir()->
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:151:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ZBarrierSetC1::load_barrier(LIRAccess& access, LIR_Opr result) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:156:81:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const address runtime_stub = load_barrier_on_oop_field_preloaded_runtime_stub(access.decorators());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:157:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CodeStub* const stub = new ZLoadBarrierStubC1(access, result, runtime_stub);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:162:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ZBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:166:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = barrier_needed(access) && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:166:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = barrier_needed(access) && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:167:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::resolve_address(access, resolve_in_register || patch_before_barrier);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:172:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ZBarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:173:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::load_at_resolved(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:175:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (barrier_needed(access)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:176:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    load_barrier(access, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:180:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static void pre_load_barrier(LIRAccess& access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:181:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:190:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.gen()->access_load_at(decorators,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:191:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.type(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:192:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.base().item(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:193:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.offset().opr(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:194:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.gen()->new_register(access.type()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:194:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.gen()->new_register(access.type()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:199:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ZBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:200:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (barrier_needed(access)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:201:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_load_barrier(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:204:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_xchg_at_resolved(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:207:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ZBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:208:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (barrier_needed(access)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:209:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_load_barrier(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:212:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:42:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ZLoadBarrierStubC1(LIRAccess& access, LIR_Opr ref, address runtime_stub);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:64:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void load_barrier(LIRAccess& access, LIR_Opr result) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:67:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:68:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:69:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:70:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:496:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::make_cas_loadbarrier(C2AtomicAccess& access) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:498:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareAndSwapNode* cas = (CompareAndSwapNode*)access.raw_access();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:499:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  PhaseGVN& gvn = access.kit()->gvn();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:501:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:588:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::make_cmpx_loadbarrier(C2AtomicAccess& access) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:589:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareAndExchangePNode* cmpx = (CompareAndExchangePNode*)access.raw_access();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:590:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:687:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static bool barrier_needed(C2Access access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:688:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return ZBarrierSet::barrier_needed(access.decorators(), access.type());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:688:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return ZBarrierSet::barrier_needed(access.decorators(), access.type());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:691:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:692:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* p = BarrierSetC2::load_at_resolved(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:693:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!barrier_needed(access)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:697:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool weak = (access.decorators() & ON_WEAK_OOP_REF) != 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:699:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:701:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:702:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* heap_base_oop = access.base();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:703:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool unsafe = (access.decorators() & C2_UNSAFE_ACCESS) != 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:729:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return load_barrier(access.kit(), p, access.addr().node(), weak, true, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:729:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return load_barrier(access.kit(), p, access.addr().node(), weak, true, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:733:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:735:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:736:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!barrier_needed(access)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:740:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_needs_pinning(false);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:741:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return make_cmpx_loadbarrier(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:744:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:746:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:747:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!barrier_needed(access)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:751:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load_store = access.raw_access();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:752:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool weak_cas = (access.decorators() & C2_WEAK_CMPXCHG) != 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:757:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.set_needs_pinning(false);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:758:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      load_store = make_cas_loadbarrier(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:760:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.set_needs_pinning(false);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:761:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      load_store = make_cas_loadbarrier(access);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:768:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:769:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, new_val, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:770:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!barrier_needed(access)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:774:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load_store = access.raw_access();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:775:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:777:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return load_barrier(access.kit(), load_store, adr, false, false, false);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:163:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* make_cas_loadbarrier(C2AtomicAccess& access) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:164:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* make_cmpx_loadbarrier(C2AtomicAccess& access) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:171:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:172:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:176:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:180:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/jvm.h:1324:20:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    jint (JNICALL *vfprintf)(FILE *fp, const char *format, va_list args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1276:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system) ("Thread local allocation (native) for " SIZE_FORMAT
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1382:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system) ("%s", text);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1441:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("Allocation using C_HEAP_ARRAY for " SIZE_FORMAT
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1519:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("JfrClassAdapter: unable to create ClassFileStream");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1525:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("JfrClassAdapter: unable to create InstanceKlass");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1545:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("JfrClassAdapter: unable to create ClassFileStream");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1551:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("JfrClassAdapter: unable to create InstanceKlass");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:50:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("ERROR: JfrJvmtiAgent: " INT32_FORMAT " (%s): %s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:114:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("%s", error_buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:146:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("GetObjectArrayElement threw an exception");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:268:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)(illegal_state_msg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:269:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("JFR uses JVMTI RetransformClasses and requires the JVMTI state to have entered JVMTI_PHASE_LIVE.");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:270:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("Please initialize JFR in response to event JVMTI_EVENT_VM_INIT instead of JVMTI_EVENT_VM_START.");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp:530:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("%s",error_msg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp:532:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("%s", "An irrecoverable error in Jfr. Shutting down VM...");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.cpp:91:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("RegisterNatives for JVM class failed!");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:84:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("JfrUpcall failed");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:102:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("%s", error_buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:57:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)(
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:87:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)(
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:94:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)(
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:72:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("EdgeQueue reserved size total: " SIZE_FORMAT " [KB]", edge_queue.reserved_size() / K);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:73:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("EdgeQueue edges total: " SIZE_FORMAT, edge_queue.top());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:74:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("EdgeQueue liveset total: " SIZE_FORMAT " [KB]", edge_queue.live_set() / K);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:76:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("EdgeQueue commit reserve ratio: %f\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp:53:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
                         OldObjectRoot::System system,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp:60:21:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    _info._system = system;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:71:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Object sampling could not be started because the sampler could not be allocated");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:75:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Object sampling started");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:89:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Object sampling stopped");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp:58:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  static const char* system_description(System system) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp:59:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    switch (system) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:114:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("Unable to generate network utilization events");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:153:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event CPUInformation");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:176:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event CPULoad");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:212:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event SystemProcesses");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:250:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event ThreadContextSwitchRate");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp:46:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("unable to create jfr event for DCMD %s", cmd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp:47:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("exception type: %s", PENDING_EXCEPTION->klass()->external_name());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:208:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(hash_buf, "/" UINTX_FORMAT, hash);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:214:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(anonymous_symbol + result_len, hash_buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:149:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Starting a recording");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:152:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("Exception while starting a recording");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:156:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Finished starting a recording");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:177:25:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  LogTarget(Error, jfr, system) lt_error;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:416:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recorder thread STOPPED");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:190:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("Unable to open repository %s", _repo);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:253:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Request to START recording");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:259:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recording STARTED");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:305:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recording STOPPED");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp:47:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recorder thread STARTED");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp:79:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        log_debug(jfr, system)("Request to STOP recorder");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:297:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Cleared 1 full buffer of " SIZE_FORMAT " bytes.", unflushed_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:398:34:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (log_is_enabled(Debug, jfr, system)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:400:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("Cleared " SIZE_FORMAT " full buffer(s) of " SIZE_FORMAT" bytes.", count, amount);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:401:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("Current number of full buffers " SIZE_FORMAT "", current);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:694:34:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (log_is_enabled(Debug, jfr, system)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:696:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_debug(jfr, system)("%s " SIZE_FORMAT " full buffer(s) of " SIZE_FORMAT" B of data%s",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:727:36:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (log_is_enabled(Debug, jfr, system)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:728:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_debug(jfr, system)("Released " SIZE_FORMAT " dead buffer(s) of " SIZE_FORMAT" B of data.", count, amount);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:729:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_debug(jfr, system)("Current number of dead buffers " SIZE_FORMAT "", current);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:58:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Allocation: [" SIZE_FORMAT "] bytes", alloc_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:59:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Total alloc [" JLONG_FORMAT "] bytes", total_allocated);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:60:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Liveset:    [" JLONG_FORMAT "] bytes", current_live_set);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:68:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Deallocation: [" SIZE_FORMAT "] bytes", dealloc_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:69:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Total dealloc [" JLONG_FORMAT "] bytes", total_deallocated);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:70:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Liveset:      [" JLONG_FORMAT "] bytes", current_live_set);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:82:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_warning(jfr, system)("Memory allocation failed for size [" SIZE_FORMAT "] bytes", alloc_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:50:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system) \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:51:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, event) \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:52:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, setting) \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:53:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, bytecode) \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:54:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, parser) \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:55:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, metadata) \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:319:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name_buf, "%s::%s", vmField.typeName, vmField.fieldName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:426:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    int ret = sscanf(outputstr + 1, SIZE_FORMAT, &idx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:153:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(oldest_name, archive_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:426:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result + i, first);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:433:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result + i, second);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessageBuffer.cpp:113:28:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    written += (size_t)os::vsnprintf(current_buffer_position, remaining_buffer_length, fmt, copy) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.hpp:154:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  LOG_TAG(system) \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:121:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ret = os::vsnprintf(buf + prefix_len, sizeof(buf) - prefix_len, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:124:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ret = os::vsnprintf(buf, sizeof(buf), fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:131:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ret = os::vsnprintf(newbuf + prefix_len, newbuf_len - prefix_len, fmt, saved_args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:146:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(header_version, vm_version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:250:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_name->data(), name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:1945:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf("long         " INT64_FORMAT, (int64_t) *(jlong *) &val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:2154:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  os::vsnprintf(msg_buffer, sizeof(msg_buffer), format, ap);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:341:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                access ? "" : "NOT ",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:345:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2949:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return (access & (~JVM_ACC_SUPER)) & JVM_ACC_WRITTEN_FLAGS;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:660:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result + name_len, addr_buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:155:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dest, klass_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:157:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(&dest[klass_name_len + 1], method_name->as_C_string());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:158:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(&dest[klass_name_len + 1 + method_name_len], signature->as_C_string());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2138:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, Matcher::regName[reg]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2140:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf,"%s + #%d",OptoReg::regname(OptoReg::c_frame_pointer),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1583:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2Access access(this, decorators | C2_WRITE_ACCESS, bt, obj, addr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1584:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1585:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::store_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1587:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->store_at(access, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1602:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2Access access(this, decorators | C2_READ_ACCESS, bt, obj, addr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1603:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1604:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::load_at(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1606:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->load_at(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1619:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2Access access(this, decorators | C2_READ_ACCESS, bt, NULL, addr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1620:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1621:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::load_at(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1623:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->load_at(access, val_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1639:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1641:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1642:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_cmpxchg_val_at(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1644:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_cmpxchg_val_at(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1660:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1662:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1663:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_cmpxchg_bool_at(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1665:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_cmpxchg_bool_at(access, expected_val, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1680:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1682:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1683:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_xchg_at(access, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1685:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_xchg_at(access, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1700:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS, bt, obj, addr, alias_idx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1701:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1702:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_add_at(access, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1704:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_add_at(access, new_val, value_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:540:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          sprintf(buffer, JLONG_FORMAT, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:2848:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer, "Bytecode %d: %s", bci(), Bytecodes::name(bc()));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1547:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "min+" INT32_FORMAT, n - min_jint);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1551:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "max-" INT32_FORMAT, max_jint - n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1553:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, INT32_FORMAT, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1808:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "%s+" JLONG_FORMAT, xname, n - x);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1811:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "%s-" JLONG_FORMAT, xname, x - n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1823:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "min+" JLONG_FORMAT, n - min_jlong);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1827:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "max-" JLONG_FORMAT, max_jlong - n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1835:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, JLONG_FORMAT, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.cpp:36:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2946:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(trial_name_str, prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2947:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(trial_name_str, name_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:2775:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = os::vsnprintf(str, count, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:2808:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return vfprintf(f, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1669:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(trial_name_str, prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1670:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(trial_name_str, name_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1193:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(info_ptr->name, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1440:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(info_ptr->name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2379:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result, class_sig);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2396:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(gen_result, gen_sig);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2445:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*source_name_ptr, sfncp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2825:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(*source_debug_extension_ptr, sde);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2884:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*name_ptr, fieldName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2893:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*signature_ptr, fieldSignature);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2905:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(*generic_ptr, gen_sig);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2961:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*name_ptr, utf8_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2968:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*signature_ptr, utf8_signature);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2981:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(*generic_ptr, gen_sig);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3139:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(name_buf, utf8_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3143:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sig_buf, utf8_signature);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3149:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(gen_sig_buf, utf8_gen_sign);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3695:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(*tmp_value, key);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3725:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(*value_ptr, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:459:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(prefix_copy, prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1174:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dup_str, str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:114:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_funcs[i].id, id);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:122:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_funcs[i].short_description, desc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:146:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(dst_params[j].name, src_params[j].name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:202:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_events[i].id, id);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:210:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_events[i].short_description, desc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:234:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(dst_params[j].name, src_params[j].name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.cpp:59:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  _name = strcpy(NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal), name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3763:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(trial_name_str, prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3764:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(trial_name_str, name_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:128:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_value, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:148:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sp, _value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:149:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(sp, os::path_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:150:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(sp, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:153:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sp, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:165:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_value, value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:200:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_key, key);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:211:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:216:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_options, options);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2329:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(name, "%s/%s/%s",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp:1305:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fv.description, description);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp:127:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(_log_fp, UINTX_FORMAT_W(6) ",", CodeCache::capacity() / K);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp:129:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(_log_fp, UINTX_FORMAT_W(6) "," UINTX_FORMAT_W(6) ",%6ld\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:204:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    def(SATB_Q_FL_lock             , PaddedMutex  , access,      true,  Monitor::_safepoint_check_never);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:205:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    def(SATB_Q_CBL_mon             , PaddedMonitor, access,      true,  Monitor::_safepoint_check_never);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:208:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    def(DirtyCardQ_FL_lock         , PaddedMutex  , access,      true,  Monitor::_safepoint_check_never);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:209:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    def(DirtyCardQ_CBL_mon         , PaddedMonitor, access,      true,  Monitor::_safepoint_check_never);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:224:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    def(SATB_Q_FL_lock             , PaddedMutex  , access,      true,  Monitor::_safepoint_check_never);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:225:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    def(SATB_Q_CBL_mon             , PaddedMonitor, access,      true,  Monitor::_safepoint_check_never);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2318:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(knobs, SyncKnobs);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:109:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int os::snprintf(char* buf, size_t len, const char* fmt, ...) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:112:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = os::vsnprintf(buf, len, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:612:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dup_str, str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1253:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(q, home);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1279:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(modified_mode, "%s" LINUX_ONLY("e") BSD_ONLY("e") WINDOWS_ONLY("N"), mode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1347:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(inpath, path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:671:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  static int vsnprintf(char* buf, size_t len, const char* fmt, va_list args) ATTRIBUTE_PRINTF(3, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:672:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  static int snprintf(char* buf, size_t len, const char* fmt, ...) ATTRIBUTE_PRINTF(3, 4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:93:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(_name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:104:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_name, "%s.%s", prefix, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:158:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cname, name());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:369:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(result, "%s.%s", ns, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:657:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      AccessFlags access,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:681:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.is_public()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:698:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_protected()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:703:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access.is_static() || // static fields are ok, see 6622385
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:715:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_private() && is_same_class_package(current_class, member_class)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:721:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_private() && host_class == current_class) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:728:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.hpp:96:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       AccessFlags access,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:103:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, next_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:116:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      || sscanf(str, JLONG_FORMAT "%n", &_value, &scanned) != 1
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:213:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  int argc = sscanf(str, JLONG_FORMAT, &_value._time);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:313:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  int res = sscanf(str, UINT64_FORMAT "%c", &_value._val, &_value._multiplier);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1998:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(str, error());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2061:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(base_path, HeapDumpPath);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2075:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(base_path, os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:153:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, INTX_FORMAT, &value)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:170:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, UINTX_FORMAT, &value)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:187:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, UINT64_FORMAT, &value)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:204:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, SIZE_FORMAT, &value)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/compilerWarnings.hpp:41:60:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ATTRIBUTE_PRINTF(fmt,vargs)  __attribute__((format(printf, fmt, vargs)))
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/compilerWarnings.hpp:44:59:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define ATTRIBUTE_SCANF(fmt,vargs)  __attribute__((format(scanf, fmt, vargs)))
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:79:40:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   functions that do not slow down the system too much and thus can be left in optimized code.
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:120:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(err, format, ap);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:423:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buffer, "printnm: " INTPTR_FORMAT, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:120:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_filepath, filepath);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.cpp:249:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  os::vsnprintf(msg, max_msg_size, format, ap);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:102:23:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    int written = os::vsnprintf(buffer, buflen, format, ap);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:447:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, force_directory);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:448:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:488:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[buf_pos + first], p1st);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:492:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(&buf[buf_pos + second - first - 2], p2nd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:496:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(buf, tail);      // append rest of name, or all of name
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:108:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat(languageString, region);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:486:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sProps->protocol##Port, buf);                                \
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:456:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(jvm_cfg, F_OK) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:461:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(libjava, F_OK) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:472:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(libjava, F_OK) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:496:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(jvm_cfg, F_OK) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:534:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(realPathToSelf, F_OK) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:506:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(libName, cname+prefixLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:174:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, radical);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:175:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(path, replaced);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:36:34:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  #define JLI_ReportMessage(...) printf(__VA_ARGS__)
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:878:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  int args_read = sscanf(s, JLONG_FORMAT_SPECIFIER, &n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:987:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(def, format, s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1438:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(tmp, "-X%s", arg + 1); /* skip '-' */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1771:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(envcp, "-Denv.class.path=%s", s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1784:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(apphome, "-Dapplication.home=%s", home);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2380:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2393:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, fmt, vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:108:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(fmt,vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:76:33:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define JLI_StrCat(p1, p2)      strcat((p1), (p2))
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:77:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define JLI_StrCpy(p1, p2)      strcpy((p1), (p2))
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:103:41:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define JLI_Snprintf                    snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:109:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return access(filename, F_OK) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:643:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bucket->name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:704:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bucket->name, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:1570:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        int access;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:1586:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if (access != -1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:1596:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        } else if (access & JVM_ACC_PROTECTED) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2634:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ((access != ACCESS_NONE) && (new_mask_count > 0)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:131:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access,             /* Read and/or write permission */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:148:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access,             /* Read and/or write permission */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:809:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1496:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(entryname, entry->name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:110:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#    if !defined(vsnprintf) && !defined(NO_vsnprintf)
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:112:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#         define vsnprintf _vsnprintf
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:134:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:134:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:240:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(state->path, path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:638:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state->msg, state->path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:640:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(state->msg, msg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:441:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(next, format, va);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:445:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = vsprintf(next, format, va);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:449:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(next, state->size, format, va);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:452:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(next, state->size, format, va);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:535:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11, a12,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:541:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:546:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8, a9,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:550:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:266:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Trace(x) {if (z_verbose>=0) fprintf x ;}
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:267:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracev(x) {if (z_verbose>0) fprintf x ;}
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:268:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracevv(x) {if (z_verbose>1) fprintf x ;}
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:269:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;}
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:270:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;}
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:74:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, msg, arg1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:94:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char *s, const char *format, ...);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:85:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, alist);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:173:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(path, ATTACH_FILE_PATTERN, pid);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:183:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(path, DOOR_FILE_PATTERN, pid);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:376:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(buf, PROTOCOL_VERSION);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:378:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pos, cstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:400:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buf+size, cstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:227:5:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execv(java, (char * const *) nargv);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:292:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buf, BIN_PATH);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:263:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(errmsg, fmtsize, IOE_FORMAT, errnum, detail);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:282:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(tty, format, ap);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:113:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    return strcat(strcat(strcpy(path, dir), "/"), name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:113:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    return strcat(strcat(strcpy(path, dir), "/"), name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:713:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapfilename, java_home_dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:881:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, (const char *)"GMT%c%02d:%02d",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:918:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, (const char *)"GMT%c%02d:%02d",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:170:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(path, mode) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:181:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          jint access,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:190:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        switch (access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:259:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(r + rn, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:265:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(resolved, path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:223:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execvp(file, (char **) argv);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:240:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execvp(file, (char **) argv);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:133:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp, lc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:159:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp, lc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:185:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(encoding_variant, p); /* Copy the leading '.' */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:188:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(encoding_variant, p); /* Copy the leading '@' */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:203:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:214:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(encoding_variant, p); /* Copy the leading '.' */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:217:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(encoding_variant, p); /* Copy the leading '@' */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:241:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(*std_language, language);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:249:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(*std_country, country);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:448:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(os_version, name.version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:450:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(os_version, name.release);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:55:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(jniEntryName, sym);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:58:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(jniEntryName, cname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:185:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:205:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:235:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return ((access(buffer, X_OK) == 0) ? 1 : 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:396:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(new_runpath, LD_LIBRARY_PATH "="
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:467:13:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            execv(newexec, argv);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:470:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execv(newexec, argv);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:513:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(libjava, F_OK) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:524:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(libjava, F_OK) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:786:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(pid_prop_str, "%s%d", substr, getpid());
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1220:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(addr6, "%s:%s:%s:%s:%s:%s:%s:%s",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1827:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(style1dev, DEV_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1828:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(style1dev, ifname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:434:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(buf, format, hostname, error_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:963:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RESTARTABLE(access(path, (int)amode), err);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:973:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RESTARTABLE(access(path, F_OK), err);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:988:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(ret, fixes[!prefix][!positive][style][pattern]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:534:9:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
        wcscat(domain, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:85:11:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        ? swprintf(utf16_javaMessage, MESSAGE_LENGTH, L"%s error=%d, %s", functionName, errnum, utf16_OSErrorMsg)
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:86:11:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        : swprintf(utf16_javaMessage, MESSAGE_LENGTH, L"%s failed, error=%d", functionName, errnum);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:486:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access,             /* Read and/or write permission */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:368:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(winZoneName, subKeyName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:447:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapFileName, java_home_dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:448:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(mapFileName, MAPPINGS_FILE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:155:25:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                        wcscpy(p2, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:157:25:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                        wcscpy(tmp, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:397:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                                 jobject file, jint access)
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:408:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:428:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                           jint access,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:673:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(search_path, pathbuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:631:17:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                wcscpy(pathbuf, path );
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:635:17:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
                wcscat(pathbuf, path + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:639:13:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
            wcscat(pathbuf, path );
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dirp->path, dirname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:116:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dirp->dirent.d_name, dirp->find_data.cFileName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:140:17:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                wcscpy(pathbuf, path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:167:26:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                         wcscpy(pathbuf, ps);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:193:25:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                        wcscpy(pathbuf, ps);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:258:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access,             /* Read and/or write permission */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:177:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ret, elems[0]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:183:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(ret, elems[index]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:48:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(path, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:55:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(path, name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:41:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(dest, path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:63:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(jniEntryName, cname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:64:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(jniEntryName, p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:67:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(jniEntryName, sym);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:69:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(jniEntryName, cname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:72:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(jniEntryName, sym);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:486:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    rc = vsnprintf(buffer, size, format, vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:530:13:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
            wcscpy(wfullname_w_prefix, ELP_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:531:13:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
            wcscpy(wfullname_w_prefix+elplen, wfullname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:569:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:633:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, vl);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:299:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(curr->name, dev_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:361:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy (nif->name, newname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:362:25:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                        wcscpy ((PWCHAR)nif->displayName, ptr->FriendlyName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:71:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(s1, s2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:150:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(key,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1986:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(errmsg, "error getting socket option: %s", tmpbuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:193:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(exc, "%s%s", JNU_JAVANETPKG, excP);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:966:9:  [4] (access) SetThreadToken:
  If this call fails, the program could fail to drop heightened privileges
  (CWE-250). Make sure the return value is checked, and do not continue if a
  failure is reported.
    if (SetThreadToken(hThread, hToken) == 0)
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-death-test-internal.h:169:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(\
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2512:20:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
inline const char* StrNCpy(char* dest, const char* src, size_t n) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2583:26:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define GTEST_SNPRINTF_ _snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2585:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define GTEST_SNPRINTF_ snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:141:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define vsnprintf _vsnprintf
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3042:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3063:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3070:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:53:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    float system;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:142:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:148:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:156:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:172:30:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.5, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:177:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:184:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:195:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:202:30:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.5, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:207:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:214:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:224:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(1, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:229:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:236:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:247:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:254:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(1, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:259:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:266:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:281:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:287:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:293:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp:176:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(input, "%s,%s", decorator_name_array[0], decorator_name_array[3]);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:147:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(data, "%s", start_marker);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:151:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(data + size - strlen(end_marker) - 1, "%s", end_marker);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:311:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = os::vsnprintf(buf, len, fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:316:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
TEST_VM(os, vsnprintf) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:320:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
TEST_VM(os, snprintf) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:321:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  test_snprintf(os::snprintf, true);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:241:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C0: unexpected export of %s from base to this", pkg);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:251:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C1: error in add export of %s from base to this", pkg);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:260:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C2: failed to export %s from base to this", pkg);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:269:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C3: unexpected export of %s from base to all modules", pkg);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:99:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fieldName, name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:100:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(fieldName, modified ? "_modify" : "_access");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:79:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(mainThreadName, threadName);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:61:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(threadGroupName, groupInfo.name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/setfldw003.c:149:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting access watch on fld%" PRIuPTR, i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/setfldw004.c:155:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting access watch on fld%" PRIuPTR, i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/setfmodw003.c:171:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting modification watch on fld%" PRIuPTR, i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/setfmodw004.c:169:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting modification watch on fld%" PRIuPTR, i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.c:73:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name, "%s%d", prefix, eventsCount);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.c:72:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name, "%s%d", prefix, eventsCount);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:55:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(filename,"%s/%s/%s.class",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:58:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(filename,"%s/%s.class",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:424:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename,"%s/%s%02d/%s.class",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:483:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, threadName);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:513:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, className);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:424:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename,"%s/%s/%s.class",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:483:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, threadName);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:513:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, className);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:310:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled ");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:311:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(kind, kind0);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:310:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled ");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:311:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(kind, kind0);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:312:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled ");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:313:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(kind, kind0);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:51:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:52:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:54:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:56:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:80:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:55:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:56:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:58:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:60:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:84:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:52:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:53:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:55:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:57:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:80:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:51:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:52:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:54:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:56:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf(" unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:74:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:51:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:52:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:74:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:51:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:52:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:54:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:56:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:74:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:51:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:52:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:54:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:56:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:80:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:51:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:52:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:54:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:56:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:80:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:73:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:74:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf(" unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:76:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:78:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf(" unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:103:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:61:68:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:62:74:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;}
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:64:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:66:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:80:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:90:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1219:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(error_msg, "JVMTIagent: getVerdict: %s event occured after VMDeath",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1236:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(format, ar);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:111:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(classNameBuffer, className);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:126:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(threadNameBuffer, info.name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:247:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file,"%s/%s.class",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:510:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file,"%s/%s.class",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:597:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, bufsize, PATH_FORMAT, DIR_NAME, redefineCnt, dir);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h:392:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h:392:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:152:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void) vsnprintf(msg_buf, sizeof(msg_buf), format, ap);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:239:13:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    int x = vfprintf(stdout,format,ap);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:285:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(hex, buf);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:150:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(path, name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:161:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(path, name);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:226:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  tmpdir = getenv("TEMP");
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:253:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:257:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:371:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:377:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:382:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:394:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:420:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:483:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:488:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:501:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    rc = CreateProcess(NULL,
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:501:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    rc = CreateProcess(NULL,
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:521:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:533:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:539:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (getenv("DEBUG_FIXPATH") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.cpp:61:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
bool libo4::realpath(const char* file_name, char* resolved_name,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.hpp:80:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  static bool realpath(const char* file_name, char* resolved_name,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:582:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *v = ::getenv("LIBPATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1347:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
               filename, ::getenv("LIBPATH"), ::getenv("LD_LIBRARY_PATH"), error_report);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1347:49:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
               filename, ::getenv("LIBPATH"), ::getenv("LD_LIBRARY_PATH"), error_report);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1446:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const ldr_cntrl = ::getenv("LDR_CNTRL");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1450:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const extshm = ::getenv("EXTSHM");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1457:46:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const aixthread_guardpages = ::getenv("AIXTHREAD_GUARDPAGES");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1591:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char* rp = os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1610:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1622:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        rp = os::Posix::realpath(java_home_var, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1643:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          rp = os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2846:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4152:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("EXTSHM");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4176:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("XPG_SUS_ENV");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4190:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    p = ::getenv("QIBM_MULTI_THREADED");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4194:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("LDR_CNTRL");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4203:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("AIXTHREAD_GUARDPAGES");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:719:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  return realpath(buffer, _exePath);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:304:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *home_dir = ::getenv("HOME");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:409:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *v = ::getenv("LD_LIBRARY_PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:490:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *l = ::getenv("JAVA_LIBRARY_PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:494:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *v = ::getenv("DYLD_LIBRARY_PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1738:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1761:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1770:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        rp = os::Posix::realpath(java_home_var, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1804:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:2691:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:470:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *v = ::getenv("LD_LIBRARY_PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2588:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2610:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2622:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        rp = os::Posix::realpath(java_home_var, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2643:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4533:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:779:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  return realpath(buffer, _exePath);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1422:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
char* os::Posix::realpath(const char* filename, char* outbuf, size_t outbuflen) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1435:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char* p = ::realpath(filename, NULL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1452:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
      p = ::realpath(filename, outbuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.hpp:109:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  static char* realpath(const char* filename, char* outbuf, size_t outbuflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1961:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1985:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1994:24:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        if (os::Posix::realpath(java_home_var, buf, buflen) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2013:26:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          if (os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2441:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return ids[os::random() % r];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:195:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *alt_home_dir = ::getenv("_ALT_JAVA_HOME_DIR");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:254:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *path_str = ::getenv("PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1363:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  void * result = LoadLibrary(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1883:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:2871:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  int ran_num = os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3818:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection((CRITICAL_SECTION*)pcrit_sect);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3859:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      EnterCriticalSection(&crit_sect);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5347:15:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
  BOOL rslt = CreateProcess(NULL,   // executable name - use command line
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5347:15:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
  BOOL rslt = CreateProcess(NULL,   // executable name - use command line
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:275:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* user = getenv("USERNAME");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:969:10:  [3] (misc) AddAccessAllowedAce:
  This doesn't set the inheritance bits in the access control entry (ACE)
  header (CWE-732). Make sure that you set inheritance by hand if you wish it
  to inherit.
    if (!AddAccessAllowedAce(newACL, ACL_REVISION,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:518:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      ::EnterCriticalSection(&g_cs);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:531:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  ::InitializeCriticalSection(&g_cs);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:95:20:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  g_dll_handle = ::LoadLibrary("DBGHELP.DLL");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:131:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      ::EnterCriticalSection(&g_cs);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:144:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  ::InitializeCriticalSection(&g_cs);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.cpp:56:48:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return hc != markOopDesc::no_hash ? hc : os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.cpp:66:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            (uint32_t) os::random(),  // current thread isn't a java thread
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp:803:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    i = os::random() % lgrp_spaces()->length();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp:847:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    i = os::random() % lgrp_spaces()->length();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp:66:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return (os::random() & 1) == 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp:73:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return (os::random() & 1) == 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.cpp:2647:62:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if (ShenandoahAllocFailureALot && !cancelled_gc() && ((os::random() % 1000) > 950)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp:281:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      (os::random() & 1) == 0) { // Simulate OOM every ~2nd slow-path call
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaDebug.cpp:40:63:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      1+(long)((double)MetadataAllocationFailALotInterval*os::random()/(max_jint+1.0));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp:42:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  _identity_hash = (short)os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:4777:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return (os::random() & RANDOMIZED_DOMAIN_MASK) < (RANDOMIZED_DOMAIN / count);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:279:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  int seed = os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:286:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    bool shrink = os::random() % 2L == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:289:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t delta = (size_t)os::random() % magnitude;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3346:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *buffer = ::getenv(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:133:72:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        _fullgc_alot_counter = 1+(long)((double)FullGCALotInterval*os::random()/(max_jint+1.0));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:151:78:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          _scavenge_alot_counter = 1+(long)((double)ScavengeALotInterval*os::random()/(max_jint+1.0));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:221:59:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    } else if (DeoptimizeRandom && (value & 0x1F) == (os::random() & 0x1F)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:267:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(ScavengeALotInterval * FullGCALotInterval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp:280:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if (x == 0) x = 1|os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:836:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
int os::random() {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:932:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *envvar = ::getenv(env_list[i]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:818:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  static int random();                     // return 32bit pseudorandom number
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp:675:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    value = os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp:1803:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  GVars.stwRandom = os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:274:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  _hashStateX = os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.cpp:162:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    int tnum = os::random() & 0x3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.cpp:163:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    int fnum =  os::random() & 0x3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp:71:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  nmt_env_value = ::getenv(nmt_env_variable);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:104:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* s = ::getenv("HOTSPOT_FATAL_ERROR_DURING_DYNAMIC_INITIALIZATION");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:41:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        lc = getenv("LANG");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:228:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *ev = getenv("AWT_FORCE_HEADFUL");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:501:28:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    char *realPathToSelf = realpath(selfInfo.dli_fname, path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:622:29:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
                exec_path = realpath(dlinfo.dli_fname, resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:888:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("HACK_IGNORE_START_ON_FIRST_THREAD") != NULL) return;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c:146:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv(JLDEBUG_ENV_ENTRY) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c:177:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            if (getenv(JLDEBUG_ENV_ENTRY)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c:178:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *tmp = getenv("_JAVA_OPTIONS");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:472:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *env = getenv(var_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:314:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* cpath = getenv("CLASSPATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:667:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *jvmtype = getenv("JDK_ALTERNATE_VM");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:865:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                    envBuf = getenv(envName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1071:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((env_in = getenv(ENV_ENTRY)) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1765:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *s = getenv("CLASSPATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2226:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *jar_name = getenv(SPLASH_JAR_ENV_ENTRY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2227:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *file_name = getenv(SPLASH_FILE_ENV_ENTRY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:116:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv(JLDEBUG_ENV_ENTRY) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:314:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv(JLDEBUG_ENV_ENTRY) != 0)
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:466:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  debug = getenv("LIBJVMDB_DEBUG") != NULL;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:96:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    libjvm_dtrace_debug = getenv("LIBJVM_DTRACE_DEBUG") != NULL;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:199:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        if (realpath(jarfile, jarPath) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:278:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(path, buf) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:163:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *s = getenv("PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:801:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    tz = getenv("TZ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:203:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(original, resolved)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:228:17:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
            r = realpath(path, resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:351:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (strcmp(p,"US-ASCII") == 0 && getenv("LANG") == NULL &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:352:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            getenv("LC_ALL") == NULL && getenv("LC_CTYPE") == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:352:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            getenv("LC_ALL") == NULL && getenv("LC_CTYPE") == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:412:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    v = getenv("JAVA2D_FONTPATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:461:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("GNOME_DESKTOP_SESSION_ID") != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:95:22:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        char *path = realpath(info.dli_fname, buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:127:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (!realpath(name, real))
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:156:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    path = getenv("PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:244:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    llp = getenv("LD_LIBRARY_PATH");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:246:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    dmllp = getenv("LD_LIBRARY_PATH_64");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:371:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        runpath = getenv(LD_LIBRARY_PATH);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:658:29:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
                exec_path = realpath(dlinfo.dli_fname, resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c:58:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *cp = getenv("LOCALDOMAIN");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:944:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(path, resolved) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:49:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        handle = LoadLibrary(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:56:22:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            handle = LoadLibrary(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:121:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&critical_section);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:129:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&critical_section);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:215:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv(JLDEBUG_ENV_ENTRY)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:216:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            char *tmp = getenv("_JAVA_OPTIONS");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:248:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                if (LoadLibrary(crtpath) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:265:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                if (LoadLibrary(crtpath) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:372:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    if ((handle = LoadLibrary(jvmpath)) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:690:22:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        hSplashLib = LoadLibrary(libraryPath);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:749:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envValue = getenv("J2D_D3D");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:754:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envValue = getenv("J2D_D3D_PRELOAD");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:884:23:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            hVerify = LoadLibrary(libraryPath);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:893:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            hJava = LoadLibrary(libraryPath);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:902:27:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            hPreloadAwt = LoadLibrary(libraryPath);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest.h:966:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  void ShuffleTests(internal::Random* random);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2551:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const env = getenv(name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2554:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  return getenv(name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:308:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void ShuffleRange(internal::Random* random, int begin, int end,
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:329:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline void Shuffle(internal::Random* random, std::vector<E>* v) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:330:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random, 0, static_cast<int>(v->size()), v);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:796:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  internal::Random* random() { return &random_; }
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:258:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  ::InitializeCriticalSection(critical_section_);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:276:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  ::EnterCriticalSection(critical_section_);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:349:11:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        ::InitializeCriticalSection(critical_section_);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:2833:47:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void TestCase::ShuffleTests(internal::Random* random) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:2834:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  Shuffle(random, &test_indices_);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5158:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      random()->Reseed(random_seed_);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5508:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random(), 0, last_death_test_case_ + 1, &test_case_indices_);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5511:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random(), last_death_test_case_ + 1,
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5516:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    test_cases_[i]->ShuffleTests(random());
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logOutputList.cpp:79:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t output_idx = os::random() % TestOutputCount;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logOutputList.cpp:80:27:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t levelnum = os::random() % LogLevel::Count;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:106:50:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const Metaspace::MetaspaceType msType = (os::random() % 100 < 10) ?
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:123:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const int start_index = os::random() % metaspaces;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:174:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            int r = os::random() % 1000;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:176:27:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              size = (os::random() % _chunk_geometry.medium_chunk_word_size) + _chunk_geometry.medium_chunk_word_size;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:178:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              size = os::random() % 64;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:218:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        allocating = os::random() % 5 < 4;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:123:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    num = os::random();
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:150:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  bool allow_sep_change = (mods_filter & Allow_Sep_Mods) && (os::random() & 1) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:151:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  bool allow_dot_change = (mods_filter & Allow_Dot_Path) && (os::random() & 1) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:152:73:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  bool allow_dotdot_change = (mods_filter & Allow_Dot_Dot_Path) && (os::random() & 1) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:161:36:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      if (allow_sep_change && (os::random() & 3) == 3) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:162:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        int i = os::random() % (sizeof(sep_replacements) / sizeof(sep_replacements[0]));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:169:68:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        if (allow_dotdot_change && (src > path_start + 1) && ((os::random() & 7) == 7)) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:180:72:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        } else if (allow_dot_change && (src > path_start + 1) && ((os::random() & 7) == 7)) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:187:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  while (is_dir && ((os::random() & 15) == 1)) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:44:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    len = os::random() % 10;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:46:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    len = MAX2(1, (int)(os::random() % len_lorem));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp:175:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
TEST(QuickSort, random) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp:177:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t length = os::random() % 100;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp:182:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        test_array[j] = os::random() % (length * 2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c:38:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             "-Djava.class.path=%s", getenv("CLASSPATH"));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:233:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  javaclasspath = getenv("CLASSPATH");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.c:67:17:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
                InitializeCriticalSection((PCRITICAL_SECTION)mutex);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.c:74:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection((PCRITICAL_SECTION)mutex);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:151:27:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                dbghelp = LoadLibrary(path);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:162:27:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                dbghelp = LoadLibrary(path);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:116:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*b+*u, add, addlen);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:201:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *files_to_delete[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:207:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char block[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:220:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  atin = fopen(in+1, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:242:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  atout = fopen(name, "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.cpp:687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1545:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1658:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2044:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char regs[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2074:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char regs[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:5096:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comment[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:5297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comment[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:169:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (FILE *f = fopen("/proc/cpuinfo", "r")) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128], *p;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:245:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "0x%02x:0x%x:0x%03x:%d", _cpu, _variant, _model, _revision);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:246:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (_model2) sprintf(buf+strlen(buf), "(0x%03x)", _model2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:247:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_ASIMD) strcat(buf, ", simd");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:248:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_CRC32) strcat(buf, ", crc");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:249:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_AES)   strcat(buf, ", aes");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:250:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_SHA1)  strcat(buf, ", sha1");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:251:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_SHA2)  strcat(buf, ", sha256");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:252:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_ATOMICS) strcat(buf, ", lse");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.cpp:1139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp:45:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const static unsigned char Si[256] =
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp:81:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const unsigned char S[256]={
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_32.cpp:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_64.cpp:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.hpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.hpp:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/copy_ppc.hpp:50:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  default: (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp:407:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_round_consts, sha256_round_consts, sizeof(sha256_round_table));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp:962:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_round_consts, sha512_round_consts, sizeof(sha512_round_table));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp:47:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[(num_features+1) * 16]; // Max 16 chars per feature.
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:409:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[500];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:410:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(info_file, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char test_area[BUFFER_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.hpp:1549:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pc, ((unsigned char *)&instr)+sizeof(unsigned long)-len, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/copy_s390.hpp:861:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.cpp:355:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[ 150 ];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.cpp:460:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char demangled_name[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.hpp:47:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.hpp:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:315:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:636:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[buf_len];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:638:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, march, hdr_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:664:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(buf, &march[hdr_len], strlen(march)-hdr_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/copy_sparc.hpp:45:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  default: (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1082:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char b1[1024], b2[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1083:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(b1, "%f", val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1084:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(b2, "%f", f[last+1]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1102:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char b1[1024], b2[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1103:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(b1, "%f", val);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1104:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(b2, "%f", d[last+1]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp:53:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[10 * BytesPerInstWord];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp:817:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp:835:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.hpp:54:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.hpp:55:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.cpp:219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.cpp:52:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char tuple_table[Assembler::EVEX_ETUP + 1][Assembler::AVX_512bit + 1] = {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/bytes_x86.hpp:50:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x, p, sizeof(T));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/bytes_x86.hpp:63:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, &x, sizeof(T));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.cpp:356:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5052:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char f[9];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5089:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5096:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char f[9];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5206:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char f[8];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:210:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char patch[4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:545:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char code_buffer[5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:560:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char patch[4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:639:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char patch[4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:6036:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst + 32 * ii,      src + 16 * ii, 16);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:6037:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst + 32 * ii + 16, src + 16 * ii, 16);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               vendor_id[VENDOR_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:608:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cpu_type_desc[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:621:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cpu_detailed_desc_buffer[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:709:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:1697:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char signature[13];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/copy_zero.hpp:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.hpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.hpp:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:66:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _path[UNIX_PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[UNIX_PATH_MAX];          // socket file
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initial_path[UNIX_PATH_MAX];  // socket file during setup
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ver_str[8];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:266:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:278:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[max_len];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:309:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              (atoi(buf) != ATTACH_PROTOCOL_VER)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:310:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:311:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:441:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(msg, "%d\n", result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[UNIX_PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:537:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fn, ".attach_pid%d", os::current_process_id());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH]; /* name of the identifier */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH];  /* processor description (type/official name) */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH];  /* processor description (type/official name) */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:259:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH];  /* processor description (type/official name) */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH]; /* processor description (type/official name) */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:562:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:628:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:691:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hardwareid[CEC_ID_LEN];          /* CEC Identifier */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:707:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:770:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char hardwareid[CEC_ID_LEN];          /* CEC Identifier */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:813:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char name[MAXCORRALNAMELEN+1]; /* name of the Workload Partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:824:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char name[MAXCORRALNAMELEN+1]; /* name of the Workload Partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:847:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char wparname[MAXCORRALNAMELEN+1];  /* WPAR NAME */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:849:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[IDENTIFIER_LENGTH]; /* name of the structure element identifier */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:922:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IDENTIFIER_LENGTH];     /* name of the logical partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:940:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[IDENTIFIER_LENGTH];  // processor description (type/official name)
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:953:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAXCORRALNAMELEN+1];  /* name of the Workload Partition */
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:908:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:912:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1572:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAXPATHLEN] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3352:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3717:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3746:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3954:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4057:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4064:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4100:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int major = atoi(uts.version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4102:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int minor = atoi(uts.release);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ver_str[20] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:243:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(procfile, "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exeName[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:574:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exePath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:629:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:632:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (atoi(entry->d_name) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:654:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:665:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(_exeName, start, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:682:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:715:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:734:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  process_info->set_pid(atoi(_entry->d_name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:101:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:333:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(::open(path, oflag, mode), fd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:335:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(::open(path, oflag), fd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:390:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:461:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(".", O_RDONLY), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:886:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:949:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, oflags), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:357:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char funcname[256] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:828:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy[1]; // Just needed to satisfy pthread_getthrds_np.
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:65:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _path[UNIX_PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:178:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[UNIX_PATH_MAX];          // socket file
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initial_path[UNIX_PATH_MAX];  // socket file during setup
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:244:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ver_str[8];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:245:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:257:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[max_len];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:286:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              (atoi(buf) != ATTACH_PROTOCOL_VER)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:287:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:288:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:411:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:412:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(msg, "%d\n", result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[UNIX_PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:459:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "/lib");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:763:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1087:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1194:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char temp_path_storage[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1239:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char localbuf[MACH_MAXSYMLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1367:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1601:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char os[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1614:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char release[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1656:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char model[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1663:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char machine[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1715:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAXPATHLEN] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1731:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dli_fname[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1971:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1978:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(buf, O_CREAT | O_RDWR, S_IRWXU);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXTHREADNAMESIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3591:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3598:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = ::open(path, oflag, mode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3659:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ::open(path, oflags, S_IREAD | S_IWRITE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3840:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3847:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3873:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char * argv[4] = {"sh", "-c", cmd, NULL};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3939:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char coreinfo[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:322:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[PROC_PIDPATHINFO_MAXSIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:456:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name_buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:100:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:307:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:373:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(".", O_RDONLY), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:795:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:873:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, oflags), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:66:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _path[UNIX_PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[UNIX_PATH_MAX];          // socket file
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:180:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initial_path[UNIX_PATH_MAX];  // socket file during setup
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:244:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ver_str[8];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:245:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:257:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[max_len];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:286:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              (atoi(buf) != ATTACH_PROTOCOL_VER)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:287:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:288:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:411:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:412:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(msg, "%d\n", result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[UNIX_PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:507:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fn, ".attach_pid%d", os::current_process_id());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/decoder_linux.cpp:61:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(filepath, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:63:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char discard[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:184:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(file, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char variable[bufsize];                                                 \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:280:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmproot[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpmount[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:308:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  mntinfo = fopen("/proc/self/mountinfo", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpcgroups[MAXPATHLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:379:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  cgroup = fopen("/proc/self/cgroup", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:259:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fh = fopen("/proc/stat", "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:365:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:367:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fp = fopen(fname, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:846:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1024:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen("/proc/self/maps", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stat[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1136:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen("/proc/self/stat", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1797:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2004:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2013:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[33];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2035:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2049:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((procmapsFile = fopen("/proc/self/maps", "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2051:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[PATH_MAX + 100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2056:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[sizeof(line)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2216:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(file, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2387:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen("/proc/cpuinfo", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2426:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_level[60];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2427:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_type[60];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2428:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_size[60];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2429:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_coherency_line_size[80];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2490:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/cpuinfo", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2493:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2565:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAXPATHLEN] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2581:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dli_fname[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2833:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2840:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(buf, O_CREAT | O_RDWR, S_IRWXU);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3302:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char vec[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3345:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char vec[stripe + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3444:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char vec[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3626:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fp = fopen("/proc/self/maps", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3629:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char chars[257];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3670:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen("/proc/self/coredump_filter", "r+")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3722:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen("/proc/meminfo", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3726:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3977:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5074:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5486:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf [16]; // according to glibc manpage, 16 chars incl. '/0'
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5585:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5614:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5844:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stat[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5846:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char proc_name[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5855:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(proc_name, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5911:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5918:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5938:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char * argv[4] = {"sh", "-c", cmd, NULL};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5943:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
    pid = vfork();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6001:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char core_pattern[core_pattern_len] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6003:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int core_pattern_file = ::open("/proc/sys/kernel/core_pattern", O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6035:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cwd[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6060:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int core_uses_pid_file = ::open("/proc/sys/kernel/core_uses_pid", O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:238:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(procfile, "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:275:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen("/proc/stat", "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[80];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:633:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exeName[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:634:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exePath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:692:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (atoi(entry->d_name) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:710:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:714:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:725:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(_exeName, start, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:737:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:742:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:775:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:794:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  process_info->set_pid(atoi(_entry->d_name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:980:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:984:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(buf, O_RDONLY, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:100:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IRUSR|S_IWUSR),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[TMP_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:320:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:385:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(".", O_RDONLY), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[MAXPATHLEN + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:655:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[24];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:659:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen(fname, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:874:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IRUSR|S_IWUSR), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:952:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(filename, oflags, 0), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char core_path[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:190:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  int fd = mkstemp(fullname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:585:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE* os::open(int fd, const char* mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:992:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[30];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1076:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[NUM_IMPORTANT_SIGS + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[0x100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:72:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _door_path[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:253:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (atoi(ver) != SolarisAttachListener::ATTACH_PROTOCOL_VER) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char door_path[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:381:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initial_path[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:554:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(msg, "%d\n", res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:598:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:647:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:650:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fn, ".attach_pid%d", os::current_process_id());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:78:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = os::open(path, O_RDONLY, 0)) < 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:515:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:520:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (atoi(entry->d_name) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:526:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char psinfo_path[PATH_MAX] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:562:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(psinfo_path, "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:587:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  process_info->set_pid(atoi(_entry->d_name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1003:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1573:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1704:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1709:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1753:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/etc/release", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1755:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1781:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open("/proc/self/map",O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1941:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAXPATHLEN] = { 0 };
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3075:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(ClassInfo.pc_clname, "TS");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3084:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(ClassInfo.pc_clname, "IA");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3093:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(ClassInfo.pc_clname, "RT");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3102:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(ClassInfo.pc_clname, "FX");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3894:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4187:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open("/dev/zero", O_RDWR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4364:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4577:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4584:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4774:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char proc_name[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4780:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(proc_name, "/proc/%d/lwp/%d/lwpusage",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4783:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = ::open(proc_name, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:5307:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * argv[4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:103:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:310:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:376:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(".", O_RDONLY), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:617:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char psinfo_name[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:622:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(psinfo_name, O_RDONLY), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:843:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:899:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, oflags), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pipe[pipe_name_max + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:327:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/include/jvm_md.h:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char d_name[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:359:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char counter[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:878:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceIndexBuffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:995:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exePath[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:1419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:194:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char home_dir[MAX_PATH + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:283:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(library_path, ";.");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2 * MAX_PATH + 2 * sizeof(EXT_DIR) + sizeof(PACKAGE_DIR) + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:655:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alt_dirname[4] = { 0, 0, 0, 0 };
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1158:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(dirp->path, "*.*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1160:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(dirp->path, "\\*.*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1212:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char path_buf[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1390:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(name, O_RDONLY | O_BINARY, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1486:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char filename[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1597:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1618:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR kernel32_path[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1823:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1825:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(tmp, "EXCEPTION_??");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1861:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAX_PATH] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3403:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3769:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4253:26:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  int unicode_path_len = MultiByteToWideChar(CP_ACP,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4263:16:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  int result = MultiByteToWideChar(CP_ACP,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4494:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4512:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE* os::open(int fd, const char* mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4530:5:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
    wcscat(wide_path, L"\\*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4561:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ::open(path, oflags, _S_IREAD | _S_IWRITE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5031:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5038:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[UNLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char root_path[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:544:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fs_type[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:185:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr(), other.ptr(), other._num * sizeof(HMODULE));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:113:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&g_version, p, sizeof(API_VERSION));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/copy_bsd_x86.inline.hpp:86:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp:914:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char kern_osrelease[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp:919:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(kern_osrelease) >= OS_X_10_9_0_KERNEL_MAJOR_VERSION) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/copy_linux_aarch64.inline.hpp:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, from, count * sizeof(HeapWord));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[CPUINFO_LINE_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:39:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* fp = fopen("/proc/cpuinfo", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:72:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char* match_field(char line[CPUINFO_LINE_SIZE], const char* field);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:83:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char* CPUinfo::match_field(char line[CPUINFO_LINE_SIZE], const char* field) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/copy_linux_x86.inline.hpp:86:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:194:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int fd_anon = os::open(path.get(), O_TMPFILE|O_EXCL|O_RDWR|O_CLOEXEC, S_IRUSR|S_IWUSR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:220:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int fd = os::open(filename, O_CREAT|O_EXCL|O_RDWR|O_CLOEXEC, S_IRUSR|S_IWUSR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.cpp:72:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fd = fopen(PROC_SELF_MOUNTINFO, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.cpp:68:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* const file = fopen(filename, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp:260:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp:262:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "caught unhandled signal %d", sig);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/os_solaris_sparc.cpp:102:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sp,reg_win,sizeof(struct rwindow));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/copy_solaris_x86.inline.hpp:34:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/copy_solaris_x86.inline.hpp:47:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp:45:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp:49:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExceptionHandlerInstr[16];  // jmp HandleExceptionFromCodeCache
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp:397:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4589:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4592:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "[...]");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4789:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    result = atoi(start);         // Convert the string to an integer
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5299:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  intval = atoi(token);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:977:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ident = (char *)NodeClassNames[i];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:982:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ident = (char *)NodeClassNames[j];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/arena.cpp:138:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( new_ptr, c_old, old_size );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:627:77:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  if( debug_output1 ) { fprintf(fp, "// top level chain rules for: %s \n", (char *)NodeClassNames[i]); } // %%%%% Explanation
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:629:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  chain_rule(fp, "   ", (char *)NodeClassNames[i], zeroCost, "Invalid",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char shft[MAXID + 1] = {1,2,3,4,5,6,7,1,2,3,4,5,6,7,1,2,3,4,5,6,7};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp:142:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( _bin, d._bin, sizeof(bucket)*_size );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( _bin[i]._keyvals, d._bin[i]._keyvals,_bin[i]._cnt*2*sizeof(void*));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.hpp:549:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char string_buffer[STRING_BUFFER_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.hpp:550:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char external_buffer[STRING_BUFFER_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[buflen], *s=buf;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1534:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(s," && ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1542:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(s," == "); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3431:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if( !cnt ) strcpy( buf, "_kids[0]->" );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3436:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if( !cnt ) strcpy( buf, "_kids[1]->" );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3443:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if( !cnt ) strcpy(buf,"_leaf");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:359:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      (ADF._fp = fopen(ADF._name, action)) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:342:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:347:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    templen = sprintf(temp, "%d", res_cycles[i]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:529:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(args, "0x%0*x, 0x%0*x, %*d",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1075:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(inst_prefix, "inst%d_",   inst_position);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1077:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(receiver,    "inst%d->", inst_position);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1173:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(left_reg_index,",inst%d_idx%d", (int)left_index, left_op_index);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1182:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char right_reg_index[18] = ",instXXXX_idxXXXX";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1186:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(right_reg_index,",inst%d_idx%d", (int)right_index, right_op_index);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2513:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char idxbuf[buflen]; char *ib = idxbuf; idxbuf[0] = '\0';
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nbuf  [buflen]; char *nb = nbuf;   nbuf[0]   = '\0';
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2515:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char opbuf [buflen]; char *ob = opbuf;  opbuf[0]  = '\0';
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:404:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(full_name, "AOT ", 4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:405:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(full_name+4, stub_name, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:638:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(meta_name, klass_name, klass_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:640:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&meta_name[klass_len + 1], method_name, method_name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:641:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&meta_name[klass_len + 1 + method_name_len], signature_name, signature_name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:959:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char * const descriptors[2] = {descriptor1, descriptor2};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:969:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:1059:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:146:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cp, AOTLibrary, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:164:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char library[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CFGPrinter.cpp:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.cpp:698:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fileStream stream(fopen("c1_compile_only", "wt"));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.cpp:714:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fileStream stream(fopen(".hotspot_compiler", "at"));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[2 * jintAsStringSize + len];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:651:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(message, "Index %d out of bounds for length %d", index, a->length());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:658:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:659:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(message, "%d", index);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1253:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1256:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = os::open(buffer, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1258:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* replay_data_file = os::open(fd, "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1271:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1274:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = os::open(buffer, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1276:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* inline_data_file = os::open(fd, "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethod.cpp:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_code, me->code_base(), code_size());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodData.cpp:105:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dp_dst, dp_src, entry_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:123:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _stream = fopen(filename, "rt");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:149:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(_buffer, "1 2 foo 4 bar 0x9 \"this is it\"");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:830:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:833:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:836:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:839:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:842:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeFlow.cpp:834:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:2875:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m->compressed_linenumber_table(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5275:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fixed_buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fixed_buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5350:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fixed_buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fixed_buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5420:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fixed_buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5549:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[1000];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_buffer_start, _buffer_start, length());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:50:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _file = fopen(file, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errmsg[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.hpp:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                _line[_line_buf_size];  // The buffer that holds the current line. Some characters in
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:164:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char version_string[10] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:271:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int file_handle = os::open(path, 0, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:357:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      version = atoi(verstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:986:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char canonical_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1738:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char modules_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:2040:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderHierarchyDCmd.cpp:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _branches[max_depth];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp:314:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _fd = os::open(filename, O_RDONLY | O_BINARY, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp:341:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char info[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:48:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(deopt_segm_path, deopt_path, tmp_end - deopt_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2228:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "Redefined)");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2232:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "Native Method)");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2242:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf + (int)strlen(buf), "Unknown Source)");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2246:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf + (int)strlen(buf), "(nmethod " INTPTR_FORMAT ")", (intptr_t)nm);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/klassFactory.cpp:261:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->data, bytes, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/loaderConstraints.cpp:349:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_loaders, p->loaders(), sizeof(ClassLoaderData*) * p->num_loaders());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_cur_ptr, ptr, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:78:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, _cur_ptr, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:339:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stack_buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:391:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stack_buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:407:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stack_buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stub_id[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:769:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                      memcpy((void*)&TopSizeArray[used_topSizeBlocks], (void*)&TopSizeArray[i], sizeof(TopSizeBlk));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:811:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                          memcpy((void*)&TopSizeArray[j], (void*)&TopSizeArray[i], sizeof(TopSizeBlk));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.cpp:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_new_buffer, _buffer, _position);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.cpp:816:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char xn[12]; sprintf(xn, "x%d", j);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.cpp:816:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      char xn[12]; sprintf(xn, "x%d", j);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.cpp:1746:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(scopes_pcs_begin(), pcs, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.cpp:1765:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(scopes_data_begin(), buffer, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:555:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2000];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:868:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_buffer[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:897:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name_buffer, "C1 CompilerThread%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:955:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name_buffer[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:1903:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  file_name[4*K];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:1917:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(file_name, "wt");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2350:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char current_method[CompilerCounters::cmname_buffer_length];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char _current_method[cmname_buffer_length];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp:178:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _last_method_compiled[name_buffer_length];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:210:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int partial_fd = open(partial_file, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.hpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          _context_buffer[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:433:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(set->_modified, src->_modified, sizeof(src->_modified));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:381:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command[33];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char flag[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:510:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:527:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[2][256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:531:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[512] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:610:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char option[256]; // stores flag for Type (1) and type of Type (2)
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:634:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errorbuf[1024] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:702:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* stream = fopen(cc_file(), "rt");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:705:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char token[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:725:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char token[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:745:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fileStream stream(fopen(cc_file(), "at"));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:756:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fileStream stream(fopen(cc_file(), "at"));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:793:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:93:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int file_handle = os::open(filename, 0, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:74:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(p, "/lib/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          _option_buf[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:279:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[32] = { 0, };
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char class_name[256] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char method_name[256] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sig[1024] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.cpp:116:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(addr, write_stream()->buffer(), write_stream()->position());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.cpp:179:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_data,om_data(),om_size() * sizeof(OopMap*));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3030:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                      _pad_front[64];   // padding to ...
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3032:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                      _pad_back[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.hpp:61:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _pad_1[64 - sizeof(jint)];    // prevent cache-line sharing
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.hpp:63:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _pad_2[64 - sizeof(jint)];    // prevent cache-line sharing
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.cpp:340:85:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
G1ArchiveAllocator* G1ArchiveAllocator::create_allocator(G1CollectedHeap* g1h, bool open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.cpp:343:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  G1ArchiveAllocator* result =  new G1ArchiveAllocator(g1h, open);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:223:49:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  G1ArchiveAllocator(G1CollectedHeap* g1h, bool open) :
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:233:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _open(open) { }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:239:74:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static G1ArchiveAllocator* create_allocator(G1CollectedHeap* g1h, bool open);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:266:62:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static inline void set_range_archive(MemRegion range, bool open);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:267:64:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static inline void clear_range_archive(MemRegion range, bool open);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:110:73:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
inline void G1ArchiveAllocator::set_range_archive(MemRegion range, bool open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:113:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                     open ? "open" : "closed",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:116:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:124:75:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
inline void G1ArchiveAllocator::clear_range_archive(MemRegion range, bool open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:127:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                    open ? "open" : "closed",
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:130:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:518:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void G1CollectedHeap::begin_archive_alloc_range(bool open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:521:69:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _archive_allocator = G1ArchiveAllocator::create_allocator(this, open);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:567:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                                            bool open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:641:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:664:55:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    G1ArchiveAllocator::set_range_archive(curr_range, open);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.hpp:690:67:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bool alloc_archive_regions(MemRegion* range, size_t count, bool open);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp:1002:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[BufLen];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad0[DEFAULT_CACHE_LINE_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad1[DEFAULT_CACHE_LINE_SIZE - sizeof(TaskQueueEntryChunk*)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad2[DEFAULT_CACHE_LINE_SIZE - sizeof(TaskQueueEntryChunk*) - sizeof(size_t)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad4[DEFAULT_CACHE_LINE_SIZE - sizeof(size_t)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.hpp:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_before[DEFAULT_CACHE_LINE_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.hpp:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_after[DEFAULT_CACHE_LINE_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetSummary.cpp:125:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_rs_threads_vtimes, other->_rs_threads_vtimes, sizeof(double) * _num_vtimes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/satbMarkQueue.cpp:298:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[SATB_PRINTER_BUFFER_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/sparsePRT.cpp:76:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cards, _cards, cards_num() * sizeof(card_elem_t));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.cpp:52:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char age_name[10];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.hpp:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      head[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.hpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      tail[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.cpp:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dashes[max_width + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.hpp:88:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char * const _names[last_stat_id];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueue.cpp:290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[SATB_PRINTER_BUFFER_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArray.inline.hpp:64:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_array, _array, sizeof(T) * _capacity);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.cpp:39:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_pages, group0, ngroup0 * sizeof(ZPage*));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.cpp:42:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_pages + ngroup0, group1, ngroup1 * sizeof(ZPage*));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zStat.cpp:894:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         _buffer[_buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp:1644:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char message[jintAsStringSize];                                          \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp:1647:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(message, "%d", index);                                       \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp:2554:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.cpp:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.cpp:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.cpp:670:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.cpp:1352:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(handler, buffer->insts_begin(), insts_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:738:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:843:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:904:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:993:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:1258:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[500];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:1454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.cpp:405:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)_bit_mask, (void *)from->_bit_mask,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.cpp:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*) _bit_mask[0], (void*) from->_bit_mask[0],
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1118:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_buffer, orig_stream->buffer(), orig_stream_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1446:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->data, new_stream->buffer(), stream_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error_buffer[ERROR_MSG_BUFFER_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethod.cpp:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pid_buf[32] = { 0 };
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(old_byte_array->byte_at_addr(0), class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[ERROR_MSG_BUFFER_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:141:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_bytes, new_byte_array->byte_at_addr(0), (size_t)new_bytes_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_bytes, new_byte_array->byte_at_addr(0), (size_t)new_bytes_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.hpp:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _buffer[OBJECT_SAMPLE_DESCRIPTION_BUFFER_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:206:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pid_buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:207:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hash_buf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp:51:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return path != NULL ? os::open(path, O_CREAT | O_RDWR, S_IREAD | S_IWRITE) : invalid_fd;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp:54:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool JfrChunkWriter::open() {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.hpp:43:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bool open();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:50:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return os::open(path, O_CREAT | O_RDWR, S_IREAD | S_IWRITE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char date_time_buffer[32] = { 0 };
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:163:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return _chunkwriter->open();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.cpp:38:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*lhs_frames, rhs_frames, length * sizeof(JfrStackFrame));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp:167:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(to->pos(), current_top, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp:179:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(to->pos(), current_top, actual_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.inline.hpp:449:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_buffer->pos(), old->pos(), used);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:504:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(cur->pos(), (void*)cur_pos, used);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:541:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(shelved->pos(), (void*)cur_pos, (size_t)used);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:576:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer->pos(), (void*)cur_pos, used);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.cpp:529:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(const_cast<u1*>(_reserved_low), low, block_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBlob.cpp:34:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(const_cast<u1*>(_data), checkpoint, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoders.hpp:98:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoders.hpp:120:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.inline.hpp:33:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, buf, len); // no encoding
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageAdapter.hpp:207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_storage, _start, previous_pos_offset + used);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.cpp:821:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_constants->start(), data_section()->base(T_BYTE), _constants_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.cpp:827:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_instructions->start(), code()->base(T_BYTE), _code_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.hpp:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _static_buffer[stack_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompiler.cpp:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256]; \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:197:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(reconstituted_code->byte_at_addr(bci + 1), s.bcp()+1, len-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:735:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pcArrayOop->byte_at_addr(0), code_metadata.get_pc_desc(), sizeof(PcDesc) * code_metadata.get_nr_pc_desc());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:741:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(scopesArrayOop->byte_at_addr(0), code_metadata.get_scopes_desc(), code_metadata.get_scopes_size());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:748:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(relocArrayOop->byte_at_addr(0), reloc_buffer->begin(), reloc_buffer->size());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:469:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:549:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp:38:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char shft[MAXID] = {1,2,3,4,5,6,7,1,2,3,4,5,6,7,1,2,3,4,5,6};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp:166:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( (void*)_bin, (void*)d._bin, sizeof(bucket)*_size );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp:170:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( _bin[i]._keyvals, d._bin[i]._keyvals,_bin[i]._cnt*2*sizeof(void*));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:84:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        if( lo != hi ) sprintf(s,"%d-%d,",lo,hi);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:85:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        else sprintf(s,"%d,",lo);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:98:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if( lo != hi ) sprintf(s,"%d-%d}",lo,hi);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:99:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    else sprintf(s,"%d}",lo);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.cpp:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( data, s.data, size*sizeof(uint32_t) ); // Fill the array
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.cpp:158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data[cnt], u2, (s.size - cnt)*sizeof(uint32_t));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:374:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.cpp:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.hpp:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _decorations_buffer[DecorationsBufferSize];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:263:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _stream = os::fopen(_file_name, FileOpenMode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:352:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _stream = os::fopen(_file_name, FileOpenMode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.hpp:47:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char         _pid_str[PidBufferSize];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.hpp:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char         _vm_start_time_str[StartTimeBufferSize];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.cpp:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stdoutmem[sizeof(LogStdoutOutput)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.cpp:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stderrmem[sizeof(LogStderrOutput)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result[*result_size], subset, sizeof(*subset) * LogTag::MaxTags);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelection.cpp:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelectionList.cpp:46:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.cpp:69:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newbuf, _buf, _pos + 1); // ..including trailing zero
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.cpp:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_buf + _pos, s, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.hpp:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char _smallbuf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[vwrite_buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TagSetBufferSize];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TagSetBufferSize];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.inline.hpp:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_addr, old_addr, MIN2(old_length, new_length) * sizeof(E));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.cpp:385:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (n > 0) memcpy(copy, old_ptr, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.cpp:413:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( new_ptr, c_old, old_size );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:157:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&header_version[JVM_IDENT_MAX-9], "%08x", hash);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:464:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, manifest, manifest_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:548:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header_version[JVM_IDENT_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:601:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(_full_path, O_RDONLY | O_BINARY, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:636:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(_full_path, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0444);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.hpp:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  _jvm_ident[JVM_IDENT_MAX];      // identifier for jvm
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/guardedMemory.cpp:36:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(innerp, ptr, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:576:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(q->data, p->data, p->length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:697:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dstvtable, srcvtable, sizeof(intptr_t) * n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:1118:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, obj, bytes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:1661:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char class_list_path_str[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_buf_[PADDING_SIZE(T, alignment)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_buf_[PADDING_SIZE(T, alignment)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_buf[pad_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.cpp:78:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)_stackmap_data->adr_at(0), (void*)sd, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.cpp:376:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)a->adr_at(0), (void*)from->adr_at(0), length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.hpp:487:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(code_base(), code, code_size());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:1921:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:648:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_state, bb->_state, _state_len*sizeof(CellTypeState));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:2153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg_buffer[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:2156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg_buffer2[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:235:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2580:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hash_buf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:653:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char addr_buf[20];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/metadata.cpp:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1399:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)newm(), (void*)m(), sizeof(Method));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1402:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newcm, m->constMethod(), sizeof(ConstMethod));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1416:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newm->code_base(), new_code, new_code_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1419:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->compressed_linenumber_table(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1425:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->method_parameters_start(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1431:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->checked_exceptions_start(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1437:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->exception_table_start(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1443:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->localvariable_table_start(),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1452:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)stackmap_data->adr_at(0),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.cpp:102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.cpp:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.cpp:114:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&new_str[idx], name_str, len * sizeof(char));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.cpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1351:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  case open:
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1502:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (e->state() != CFGEdge::open) continue;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1545:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (e->state() != CFGEdge::open) continue;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1599:39:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    } else if (e->state() == CFGEdge::open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.hpp:751:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    open,               // initial edge state; unprocessed
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.hpp:758:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _from_pct(from_pct), _to_pct(to_pct), _state(open) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/buildOopMap.cpp:187:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( _callees, flow->_callees, sizeof(short)*max_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/buildOopMap.cpp:188:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( _defs   , flow->_defs   , sizeof(Node*)*max_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:360:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[50];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:523:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[500];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:1036:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.hpp:104:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char * const names[TypeFunc::Parms+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2136:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "<OptoReg::%d>", (int)reg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2149:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf,"N%d",n->_idx); // Then use Node index
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2156:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"L%d",lidx);  // No register binding yet
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2158:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(buf,"Special");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2164:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buf,"L%d",lidx); // No register binding yet
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2171:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf,"L%d",lidx); // No register binding yet
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:225:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_worked) != 0)    strcat(buf, ",worked");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:226:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_failed) != 0)    strcat(buf, ",failed");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:227:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_disabled) != 0)  strcat(buf, ",disabled");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:228:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_virtual) != 0)   strcat(buf, ",virtual");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:229:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_both) != 0)      strcat(buf, ",nonvirtual");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char flagsbuf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:2068:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:2078:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:469:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      print_prop("idealOpcode", (const char *)NodeClassNames[node->as_Mach()->ideal_Opcode()]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:510:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer, "P%d", index);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:526:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer, "%d", value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.hpp:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/indexSet.cpp:301:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_block->words(), block->words(), sizeof(uint32_t) * words_per_block);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/library_call.cpp:392:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/library_call.cpp:462:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/machnode.cpp:767:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.cpp:1725:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_bundle_use_elements, Pipeline_Use::elaborated_elements, sizeof(Pipeline_Use::elaborated_elements));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.cpp:1775:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_bundle_use_elements,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:1338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prob_str_buf[30];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:1340:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(prob_str_buf, "%g", prob);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:2847:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phaseX.cpp:401:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)this, (void*)&nh, sizeof(*this));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.cpp:3500:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char blanks[101];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[40], buf2[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1840:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[80], buf2[80];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.hpp:809:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char * const ptr_msg[lastPTR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:424:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(orig_result, carray, sz);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:485:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:379:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char as_chars[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:2454:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(code, method->code_base(), method->code_size());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:3439:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:3446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:350:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(writeable_address(length), annos->adr_at(0), length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:575:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:899:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p+1, bcp+1, len-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:190:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(cur_oop->obj_field_addr_raw<HeapWord>(fd->offset()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:817:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*name_ptr, name, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3541:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*function_table,(JavaThread::current())->get_jni_functions(),sizeof(jniNativeInterface));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:490:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&_event_callbacks, callbacks, byte_cnt);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1254:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(si, &(sin->info), sizeof(jvmtiStackInfo));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1258:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fi, sin->info.frame_buffer, frames_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:965:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p->data, _curr_data, _curr_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:990:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(*_data_ptr, _curr_data, _curr_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:2650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:2651:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.hpp:420:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:166:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ext_funcs[i].errors, _ext_functions->at(i)->errors,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.hpp:335:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dll_name[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:424:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ebuf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/unsafe.cpp:627:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[VALUE_MAXLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:177:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "<null>");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:375:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      _sun_java_launcher_pid = atoi(tail);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[bufsz];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:980:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char version[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1002:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tagset_buffer[max_tagset_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1040:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[BUFLEN+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[BUFLEN + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value2[BUFLEN + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stripped_argname[BUFLEN+1]; // +1 for '\0'
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1272:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char version[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locked_message_buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1341:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* stream = fopen(file_name, "rb");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1352:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char token[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1981:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2341:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(module_name, patch_mod_tail, module_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2481:28:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          options = (char*)memcpy(NEW_C_HEAP_ARRAY(char, len2, mtArguments), pos+1, len2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2541:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(name, tail, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2714:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char version[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char from[3] = {separator, separator, '\0'};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char to  [2] = {separator, '\0'};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3369:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(file_name, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jvm_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ext_path_str[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4342:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      int fd = ::open(ext_path_str, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:1620:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2214:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[20];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2215:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "reason%d", reason);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2224:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[20];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2225:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "action%d", action);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2325:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char name[1*K];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp:62:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char _value[SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp:65:51:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  FlagGuard(void* flag_addr) : _addr(flag_addr) { memcpy(_value, _addr, SIZE); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp:66:51:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ~FlagGuard()                                  { memcpy(_addr, _value, SIZE); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:656:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp:75:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _log_fp = fopen(log_name , "w+");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp:1156:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(m->_name, "UNKNOWN");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[MONITOR_NAME_LEN];          // Name of mutex
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp:266:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _padding[PADDING_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp:316:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _padding[PADDING_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:410:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char klass_name[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:411:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp_sig_name[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:513:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ebuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:762:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, memblock, MIN2(size, memblock_size));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1276:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE* os::fopen(const char* path, const char* mode) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1277:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char modified_mode[20];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1280:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = ::fopen(path, modified_mode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:569:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static int open(const char *path, int oflag, int mode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:570:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static FILE* open(int fd, const char* mode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:571:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static FILE* fopen(const char* path, const char* mode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:375:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char intbuf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:381:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char intbuf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:463:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst_addr, src_addr, where);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:464:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst_addr + where + hole_sz,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:584:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_code_array, code_array(), code_length());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:587:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_code_array, method()->code_base(), code_length());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:619:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_overwrite, addr_at(bci + ilen + delta), -delta);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:2711:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char blob_id[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:2764:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_saved_code, buffer, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp:569:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         _pad_prefix[DEFAULT_CACHE_LINE_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1108:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_name[128] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1109:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_version[128] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1110:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_vendor_version[128] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_vendor_vm_bug_url[128] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:2784:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[8];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4044:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4045:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ebuf[1024] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4629:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframeArray.hpp:154:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char                _valid[RegisterMap::reg_count];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:328:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[500];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:329:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[name_length_max+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _arg[arg_count_max][arg_length_max+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:127:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_name, name, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:145:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_arg[i], arg, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:229:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(_value._unit, "ns");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:274:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(_value._unit, "ns");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.hpp:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _unit[3];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:801:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comma[2] = {0,0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:207:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[buflen];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:208:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char argbuf[argbuflen];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[buflen];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:542:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer() + position(), s, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2034:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char base_path[JVM_MAXPATHLEN] = {'\0'};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(support, &_optional_support, sizeof(jmmOptionalSupport));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nmt_env_variable[buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[buffer_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:309:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->before_gc_usage_array(), _last_gc_stat->before_gc_usage_array(), len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:310:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->after_gc_usage_array(), _last_gc_stat->after_gc_usage_array(), len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/runtimeService.cpp:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char capabilities[65];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[TEMP_BUF_SIZE] = {'\0'};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.cpp:689:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, _map, size_in_bytes());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.cpp:152:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&tmp, cur_src, sizeof(T));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.cpp:162:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cur_dst, &tmp, sizeof(T));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:199:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:422:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:661:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:678:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:736:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&g_stored_assertion_context, context, sizeof(ucontext_t));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.hpp:202:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef char PASTE_TOKENS(STATIC_ASSERT_DUMMY_TYPE_, __LINE__)[ \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:58:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)&_section_hdr, (const void*)&shdr, sizeof(shdr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:171:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _file = fopen(filepath, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.cpp:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[max_msg_size];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.hpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _buffer[bufsz];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.cpp:180:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char type2char_tab[T_CONFLICT+1]={ 0, 0, 0, 0, 'Z', 'C', 'F', 'D', 'B', 'S', 'I', 'J', 'L', '[', 'V', 0, 0, 0, 0, 0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.hpp:659:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char type2char_tab[T_CONFLICT+1];     // Map a BasicType to a jchar
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp:115:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open _open
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.cpp:228:37:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      *p = (BasicHashtableEntry<F>*)memcpy(top, (void*)*p, entry_size());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.cpp:383:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  _buckets = (HashtableBucket<F>*)memcpy(top, (void*)_buckets, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/nativeCallStack.cpp:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    buf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:114:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, result, result_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:245:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[buffer_length];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:348:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer + buffer_pos, s, write_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:406:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  pid_text[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:505:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:512:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _file = fopen(file_name, "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:522:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _file = fopen(file_name, opentype);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:951:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[4096];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1021:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer + buffer_pos, s, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1099:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&server.sin_addr, host->h_addr_list[0], host->h_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:223:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(p, "\\u%04x", c);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:278:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char utf8_buffer[4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:524:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(p, "\\u%04x", c);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char host_information[300];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char extended_resource_info_at_startup[600];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char signame_buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:239:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:423:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1052:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1208:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(buf, O_RDWR | O_CREAT | O_EXCL, 0666);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1309:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1396:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msgbuf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1438:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char signal_name[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1537:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE* replay_data_file = os::open(fd, "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1626:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.hpp:44:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char        _detail_msg[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.hpp:76:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char coredump_message[O_BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:168:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_ptr, old_ptr, old_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(push_ptr, tag, tag_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[200];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjli/java_md_aix.c:30:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char dladdr_buffer[0x8000];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/ch/AixPollPort.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stack_buf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2048];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:91:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(fn, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:156:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(fn, O_RDONLY)) < 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:215:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(args, cmdline, cmdlen + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:254:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen("/proc/stat", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:94:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:117:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:142:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:320:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:552:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:610:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:663:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:678:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char languageString[LOCALEIDLENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeString[LOCALEIDLENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:179:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmpScript[4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:182:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmpScript, scriptRegion + 1, 4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:184:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(atMark + 1, tmpScript, 4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dst[16]; // big enough for INET6
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];    /* Used for %d of an int - 16 is plenty */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jrePath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jvmPath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char libjava[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:454:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char jvm_cfg[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:484:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jvm_cfg[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:690:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char jrePath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:696:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char splashPath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:795:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char envVar[80];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:858:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char envVar[80];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char envVar[80];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:197:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uri, cproto, protoLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:198:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uri + protoLen, "://", 3);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:199:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uri + protoLen + 3, chost, hostLen + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:257:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                    char hostNameBuffer[BUFFER_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/MacOSXNativeDispatcher.c:50:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char chars_buf[(PATH_MAX + 1) * 2];     // utf16 + zero padding
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/include/jvmticmlr.h:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[50];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Class.c:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sourceBuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sourceBuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:379:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c:163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:129:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/check_version.c:36:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/check_version.c:37:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "JVM interface version mismatch: expecting %d, got %d.",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stackBuf[BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stackBuf[BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c:207:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:183:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uncompressed, decompressed_resource, (size_t) uncompressed_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uncompressed_resource, data, header_size + 2); //+ cp count
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:238:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uncompressed_resource, string, str_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:279:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                memcpy(fullpkg, pkg, str_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:282:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                memcpy(uncompressed_resource, pkg_base, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:292:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(uncompressed_resource, clazz, clazz_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:301:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(uncompressed_resource, desc_string, desc_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:314:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uncompressed_resource, data, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:331:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uncompressed_resource, data, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:344:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uncompressed_resource, data, (size_t) remain);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:285:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ImageFileReader* ImageFileReader::open(const char* name, bool big_endian) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:293:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (reader == NULL || !reader->open()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:375:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool ImageFileReader::open() {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.hpp:453:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    static ImageFileReader* open(const char* name, bool big_endian = Endian::is_big_endian());
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.hpp:468:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bool open();
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:62:47:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ImageFileReader* jfile = ImageFileReader::open(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullpath[IMAGE_MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:131:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&fullpath[index], module_name, moduleNameLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:134:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&fullpath[index], name, nameLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:51:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, begin, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4096];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:376:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fptr = fopen(arg, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jvmpath[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jrepath[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jvmcfg[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:929:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, options, numOptions * sizeof(JavaVMOption));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1048:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    env_entry[MAXNAMELEN + 24] = ENV_ENTRY "=";
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1669:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, arg, optLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1670:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p + optLen, value, valueLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1728:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    *nargv++ = (char *) JLI_WildcardExpandClasspath(argv[i+1]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1760:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char home[MAXPATHLEN]; /* application home */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2070:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[MAXPATHLEN+20];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2083:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    jvmCfg = fopen(jvmCfgName, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2186:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newKnownVMs, knownVMs, knownVMsLimit * sizeof(struct vmdesc));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:180:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str, beg, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:200:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sl->elements[i], len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:223:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sl->elements[i], len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:104:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define JLI_Open                        open
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/manifest_info.h:65:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CH(b, n) (((unsigned char *)(b))[n])
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:290:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy(eb, cp, ENDHDR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:240:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(filename, wildcard, wildlen-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:241:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(filename+wildlen-1, basename, baselen+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2042:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[257];           /* for holding manufactured argument lists */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2612:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(new_registers, registers,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2707:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[5], *p;         /* actually [2] is big enough */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3478:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result[i].modifies, masks[i].modifies, bitmask_size * sizeof(int));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3494:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result[i].modifies, masks[i].modifies, bitmask_size * sizeof(int));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3515:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char space[CCSegSize];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3821:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer_space[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3836:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buffer, p, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:159:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return open(fname, flags, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:313:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[READBLOCKSZ];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:363:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(endbuf, buf + i, ENDHDR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc64[ZIP64_LOCHDR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:511:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zip->metanames[i], name, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:581:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char endbuf[ENDHDR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:601:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char end64buf[ZIP64_ENDHDR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:791:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:844:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errbuf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1047:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ze->name, cen + CENHDR, nlen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1057:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ze->extra+2, extra, elen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1097:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ze->comment, cen + CENHDR + nlen + elen, clen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1316:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char loc[LOCHDR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1489:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.h:68:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CH(b, n) (((unsigned char *)(b))[n])
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:71:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open _open
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:60:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:89:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "unknown win32 error (%ld)", error);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:269:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        open((const char *)path, oflag, 0666));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:322:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(path, "<fd:%d>", fd);   /* for debugging */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:639:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(state->msg, ": ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:185:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->x.next, strm->next_in, strm->avail_in);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:349:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, state->x.next, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:475:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:615:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, state->x.next, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:237:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(state->in + have, buf, copy);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:333:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:468:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:567:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.c:664:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.c:1429:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/trees.c:352:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *header = fopen("trees.h", "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zcrc32.c:167:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen("crc32.h", "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.c:38:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
z_const char * const z_errmsg[10] = {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:73:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:133:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512")
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:226:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define F_OPEN(name, mode) fopen((name), (mode))
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:250:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#    define zmemcpy memcpy
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:795:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1330:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     (void) sprintf(name, "Wrong inlinedMethod%1d()", vframe_no);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_SYM_SIZE + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:120:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(open(path, flag), ret);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char res_buffer[RES_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch, buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:473:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            return atoi(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:490:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:534:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%d", probe_type);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/ch/DevPollArrayWrapper.c:44:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int wfd = open("/dev/poll", O_RDWR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          java[PATH_MAX + 1];    /* path to java binary  */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:197:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char jarPath[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:317:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(path, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:319:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[CHUNK_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:576:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pid_t childpid = (pid_t) atoi(ptr->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:631:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:638:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(fn, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:681:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char exePath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:682:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prargs[PRARGSZ + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:190:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, path, pathsize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:279:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *tty = fopen("/dev/tty", "w");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:335:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, *a, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:362:17:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
    resultPid = vfork();
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:396:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *buf, buf1[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *hlpargs[2];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:454:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf+offset, c->pdir, sp.dirlen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:61:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fileopen        fopen
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:224:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        RESTARTABLE(open(pathname, O_RDONLY), fd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:269:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(ETC_TIMEZONE_FILE, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:270:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char line[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:304:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char linkbuf[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:326:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(open(DEFAULT_ZONEINFO_FILE, O_RDONLY), fd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:401:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname, fmode)) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:408:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(open(fname, O_RDONLY), fd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:502:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char line[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:641:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(open(DEFAULT_ZONEINFO_FILE, O_RDONLY), fd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:672:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(ETC_ENVIRONMENT_FILE, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:692:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mapfilename[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:693:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:705:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tz_buf, tz, tz_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:714:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(mapfilename, "/lib/tzmappings");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:715:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tzmapf = fopen(mapfilename, "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:863:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sign, buf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:892:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sign, buf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char canonicalPath[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:212:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aix_fd_dir[32];     /* the pid has at most 19 digits */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:253:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char expanded_file[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:264:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(expanded_file, dir, dirlen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:267:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(expanded_file + dirlen, file, filelen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c:153:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int devnull = open("/dev/null", O_WRONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.h:78:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open64 open
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:381:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char tmp_path[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:418:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char list[258];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:555:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjimage/osSupport_unix.cpp:41:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return ::open(path, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[PATH_MAX + 2], *real;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cwdbuf[PATH_MAX+2];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:151:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX+2];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:169:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dir[2*PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buffer[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jpath[PATH_MAX + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char libjava[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:559:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(jvmpath, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:583:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[257];  /* recommended buffer size from sysinfo man
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:668:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:695:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char jrePath[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:696:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char splashPath[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:265:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char *tmpbuf[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:378:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uri, cproto, protoLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:379:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uri + protoLen, "://", 3);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:380:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uri + protoLen + 3, chost, hostLen + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[NI_MAXHOST + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:65:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:167:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:359:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sendbuf[1500], recvbuf[1500];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:399:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(icmp->icmp_data, &tv, sizeof(tv));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[NI_MAXHOST + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:66:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char myhostname[NI_MAXHOST + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:319:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:427:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:447:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:563:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sendbuf[1500], recvbuf[1500];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:611:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sendbuf + sizeof(struct icmp6_hdr), &tv, sizeof(tv));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:702:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:717:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&inf.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char searchName[IFNAMESIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:534:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:879:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IFNAMESIZE], vname[IFNAMESIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:902:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrP->addr, ifr_addrP, addr_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:912:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addrP->brdcast, ifr_broadaddrP, addr_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:994:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpaddr, addrP, sizeof(netaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:998:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmpaddr->addr, addrP->addr, addr_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1004:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmpaddr->brdcast, addrP->brdcast, addr_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr, &(ifreqP->ifr_addr), sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1168:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1171:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&broadaddr, &(ifreqP->ifr_broadaddr),
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1178:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[21], addr6p[8][5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1211:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen(_PATH_PROCNET_IFINET6, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1217:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char addr6[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1285:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, &ifr.ifr_hwaddr.sa_data, IFHWADDRLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1400:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr, &(ifreqP->ifr_addr), sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1407:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1410:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&broadaddr, &(ifreqP->ifr_broadaddr),
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1417:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1488:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(if6.ifr_Addr), &(ifreqP->ifr_addr),
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1565:13:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            bcopy(nddp->ndd_addr, buf, 6);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1701:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr, &(ifreqP->lifr_addr), sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1708:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ifreqP->lifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1818:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char style1dev[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1823:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1829:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(style1dev, O_RDWR)) < 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1864:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(retbuf, &buf[dlpaack->dl_addr_offset], dlpaack->dl_addr_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1892:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, &sp->sdl_data[0], sp->sdl_alen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1911:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ipAddr.sin_addr, addr, sizeof(struct in_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1912:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&arpreq.arp_pa, &ipAddr, sizeof(struct sockaddr_in));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1920:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, &arpreq.arp_ha.sa_data[0], len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2117:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(buf, (sadl->sdl_data + sadl->sdl_nlen), ETHER_ADDR_LEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:473:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:548:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:719:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:903:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:1589:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char errmsg[255];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:1590:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(errmsg,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:2136:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&(mname6.ipv6mr_multiaddr), caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainSocketImpl.c:909:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fullMsg[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXDNAME];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketInputStream.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketOutputStream.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf [64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:152:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    s = open (driver, O_RDWR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:164:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        value = atoi(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullMsg[512];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:325:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *fP = fopen("/proc/net/if_inet6", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:326:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[255];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:499:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char c1 = ((unsigned char *)target_addr)[byte_count];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char srcp[8][5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:515:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hopp[8][5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dest_str[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char device[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:534:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen("/proc/net/ipv6_route", "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:595:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (&loRoutes[nRoutes].addr,&dest_addr,sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:605:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char devname[21];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:606:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char addr6p[8][5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:609:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((f = fopen("/proc/net/if_inet6", "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:636:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localaddr [16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:647:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char staddr [16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:648:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ifname [33];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:653:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen("/proc/net/if_inet6", "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:690:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (lif->localaddr, staddr, 16);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:800:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa->sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1022:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char srcp[8][5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1023:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hopp[8][5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1026:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dest_str[40];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1028:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char device[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1035:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen("/proc/net/ipv6_route", "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1098:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char c1 = ((unsigned char *)target_addr)[byte_count];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1120:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char devname[21];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1121:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char addr6p[8][5];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1124:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((f = fopen("/proc/net/if_inet6", "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/portconfig.c:55:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen("/proc/sys/net/ipv4/ip_local_port_range", "r");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/InheritedChannel.c:142:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int fd = open(str, oflag_actual);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c:135:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        major = atoi(uts.version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c:136:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        minor = atoi(uts.release);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixCopyFile.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8192];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:71:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open64 open
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:315:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:368:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fp = fopen(path, mode);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:913:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char target[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:940:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resolved[PATH_MAX+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c:59:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "ms%d", cp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c:61:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "cp%d", cp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char token_buf[TOKEN_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  utf8_javaMessage[MESSAGE_LENGTH*2];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char val[MAX_ZONE_CHAR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:103:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ret = RegQueryValueExA(hKey, (char *) keyNames[keyIndex + 1], NULL,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:112:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    len = MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:136:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer, "GMT%c%02d:%02d",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:141:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buffer, "GMT");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:229:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR subKeyName[MAX_ZONE_CHAR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:230:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szValue[MAX_ZONE_CHAR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:436:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *items[TZ_NITEMS];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:438:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lineBuffer[MAX_ZONE_CHAR * 4];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:450:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(mapFileName, "r")) == NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:537:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char winZoneName[MAX_ZONE_CHAR];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:538:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char winMapID[MAX_MAPID_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:568:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zonename[32];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:699:9:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
        wcscat(search_path, L"\\*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1024];    /* Working copy of path */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:634:17:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
                wcscpy(pathbuf, L"\\\\?\\UNC\0");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:638:13:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
            wcscpy(pathbuf, L"\\\\?\\\0");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char alt_dirname[4] = { 0, 0, 0, 0 };
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:92:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(dirp->path, "*.*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:94:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(dirp->path, "\\*.*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:77:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        codepage = atoi(ret+2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:82:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(ret, "UTF-8");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:93:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(ret, "GBK");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:96:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(ret, "GB18030");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:109:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR  mbChar[2] = {(char)0xfa, (char)0x41};
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:111:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP, 0, mbChar, 2, &unicodeChar, 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:113:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(ret, "MS950_HKSCS_XP");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:121:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char systemPath[MAX_PATH + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:126:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                strcat(systemPath, "\\FONTS\\SimSun18030.ttc");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:127:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                if ((f = fopen(systemPath, "r")) != NULL) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:129:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                    strcpy(ret, "GB18030");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:147:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "ms%d", cp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:149:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "cp%d", cp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char * elems[5]; // lang, script, ctry, variant, encoding
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:285:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[SNAMESIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:319:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(*language, "en");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:320:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(*country, "US");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:332:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*language, "no");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:333:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*country , "NO");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:335:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*language, "no");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:336:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*country , "NO");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:337:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*variant, "NY");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:386:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:573:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d.%d", majorVersion, minorVersion);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:42:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return ::open(path, O_BINARY | O_NOINHERIT, O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char crtpath[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char javadll[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:679:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char libraryPath[MAXPATHLEN]; /* some extra space for JLI_StrCat'ing SPLASHSCREEN_SO */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:854:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char libraryPath[MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:46:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:120:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SendData[32] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:47:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:146:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:274:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:389:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SendData[32] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:470:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:481:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&inf.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:146:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ret, ifrowP, sizeof(MIB_IFROW));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:217:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dev_name[8];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:268:20:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            wlen = MultiByteToWideChar(CP_OEMCP, 0, ifrowP->bDescr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:307:17:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            if (MultiByteToWideChar(CP_OEMCP, 0, ifrowP->bDescr,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:123:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char error_msg_buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:192:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char error_msg_buf[100];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:225:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, ptr, sizeof(IP_ADAPTER_ADDRESSES));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:327:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char newname [128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:350:33:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                sprintf (newname, "tun%d", tun);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:353:33:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                sprintf (newname, "net%d", net);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[MAX_STR_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:148:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char key[MAX_STR_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char searchlist[MAX_STR_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nameservers[MAX_STR_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketInputStream.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketOutputStream.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:675:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:952:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1866:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char errmsg[255];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1867:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(errmsg,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1982:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmpbuf[255];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1984:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errmsg[255 + 31];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char exc[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullMsg[256];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:176:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        excP = (char *)winsock_errors[i].exc;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:178:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     (char *)winsock_errors[i].errString, msg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:831:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa->sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.h:73:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy ((DST), (SRC), sizeof (struct sockaddr_in6));    \
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.h:75:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy ((DST), (SRC), sizeof (struct sockaddr_in));     \
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramChannelImpl.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:105:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        bufs[i].buf = (char *)iovp[i].iov_base;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:196:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        bufs[i].buf = (char *)iovp[i].iov_base;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:105:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        bufs[i].buf = (char *)iovp[i].iov_base;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:218:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char* ptr = (char *)iovp[next_index].iov_base;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c:215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bytes[WAKEUP_SOCKET_BUF_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[8];
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2524:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return fopen(path, mode);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc:341:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc:762:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char executable_path[_MAX_PATH + 1];  // NOLINT
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc:1243:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int cwd_fd = open(".", O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-filepath.cc:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[GTEST_PATH_MAX_ + 1] = { '\0' };
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-filepath.cc:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[GTEST_PATH_MAX_ + 1] = { '\0' };
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:135:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int fd = open("/proc/self/as", O_RDONLY);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:922:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, regex, len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:996:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_dir_path[MAX_PATH + 1] = { '\0' };  // NOLINT
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:997:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_file_path[MAX_PATH + 1] = { '\0' };  // NOLINT
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:1034:29:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    const int captured_fd = mkstemp(name_template);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char text[5] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:909:7:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      MultiByteToWideChar(CP_ACP, 0, ansi, length,
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:912:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  MultiByteToWideChar(CP_ACP, 0, ansi, length,
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:1728:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_text[kBufSize] = { '\0' };
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:1812:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[5];  // Big enough for the largest valid code point.
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:4346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:4352:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char block[block_size];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clear_block[block_size];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char set_block[block_size];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_oopStorage.cpp:649:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char _states[_max_workers][_max_entries];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestFixture.hpp:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _filename[2 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp:114:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_log.cpp:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char big_msg[4096] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_log.cpp:62:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(TestLogFileName, "r");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _all_decorators[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char other_file_name[2 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:262:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected_buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:393:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_tags[1 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decstr[1 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_filename[1 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_lines_data[lines][line_length];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelectionList.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTag.cpp:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[LogTag::Count * 16] = {0};
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ts_name[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:167:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char other_name[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[1 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:52:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "w+");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[1 * K];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_oop.cpp:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char memory[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_typeArrayOop.cpp:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mem[100];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_arguments.cpp:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ullong_max[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_arguments.cpp:161:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buff[100];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2 * (sizeof(expected) + padding_size)];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:253:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char check_buffer[sizeof(buffer)];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:61:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t abs_path[JVM_MAXPATHLEN]; \
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:62:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t cwd[JVM_MAXPATHLEN]; \
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:222:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = os::open(buf, O_RDONLY, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:239:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      int fd = os::open(buf, O_RDONLY, 0);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:252:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:263:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:274:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:368:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t abs[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:387:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:402:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t cwd[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:403:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_rel_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:404:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t long_rel_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:405:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t empty_dir_rel_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:406:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t not_empty_dir_rel_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:407:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t file_rel_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:408:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_file_rel_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:409:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:410:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t empty_dir_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:411:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t not_empty_dir_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:412:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_file_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:413:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t file_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:414:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_unc_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:415:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t empty_dir_unc_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:416:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t not_empty_dir_unc_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:417:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_file_unc_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:418:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t file_unc_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:419:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t root_dir_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:420:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t root_rel_dir_path[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:436:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(nearly_long_rel_path, dir_prefix, sizeof(wchar_t) * dir_prefix_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:505:14:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static wchar_t top_buf[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:511:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(top_buf, cwd + 3, top_len * 2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:591:14:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128 + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100 + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char res[60];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNICritical.c:32:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(bb, aa, len * sizeof(jint));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classpath[4096];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:71:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char altstack[SIGSTKSZ];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char javaclasspathopt[4096];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c:38:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char path[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lib[PATH_MAX];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:122:77:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
jboolean is_exported(JNIEnv *env, jobject module, const char* pkg, jboolean open) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:129:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        const char* name = open ? "isOpen" : "isExported";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:140:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        jboolean open) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:147:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        const char* name = open ? "isOpen" : "isExported";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:158:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                              jboolean open) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:160:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (open) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:173:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                              jboolean open) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:174:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char strbuf[128] = { '\0' };
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:176:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    const char* pkg = open ? "jdk.internal.math"
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:179:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    const char* jvmti_fn = open ? "AddModuleOpens"
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:185:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(NULL, pkg, thisModule, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:194:60:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, NULL, thisModule, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:203:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, pkg, NULL, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:212:63:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, bad_pkg, thisModule, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:221:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports((jobject)cls, pkg, thisModule, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:230:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, pkg, (jobject)cls, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:239:65:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    exported = is_exported_to(env, baseModule, pkg, thisModule, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:248:59:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, pkg, thisModule, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:258:65:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    exported = is_exported_to(env, baseModule, pkg, thisModule, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:267:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    exported = is_exported(env, baseModule, pkg, open);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.c:439:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_objects, storage->live_objects, current_count * sizeof(*new_objects));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.c:459:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(allocated_frames, frames, count * sizeof(*allocated_frames));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:79:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, TO, n);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.c:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/attach002aAgent00.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.c:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:58:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char mainThreadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loadedClassName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/attach014Agent00.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent00.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent01.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/attach022Agent00.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startedThreadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.c:75:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadGroupName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:71:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startedThreadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startedThreadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.c:77:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent00.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent01.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent02.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/attach046Agent00.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.c:67:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.c:67:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/curthrcputime001.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64], buf3[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/curthrtimerinfo001.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/frameloc002.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/thrcputime001.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64], buf3[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/thrcputime002.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64], buf3[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/thrtimerinfo001.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/gettime001.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32], buf2[32], buf3[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/timerinfo001.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32], buf2[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/mentry001.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/mexit001.c:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/mexit002.c:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.c:164:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        meth.name = (char *) METHODS[1][0];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.c:165:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        meth.signature = (char *) METHODS[1][1];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/objfree001.c:57:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MEM_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/objfree002.c:54:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MEM_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:67:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:159:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:67:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:172:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:67:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:185:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:67:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:185:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:68:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:186:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c:302:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            (*jvmti_env)->Deallocate(jvmti_env, (unsigned char *)(table[j].name));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c:303:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            (*jvmti_env)->Deallocate(jvmti_env, (unsigned char *)(table[j].signature));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/retransform004.c:98:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*new_class_data, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/setenvstor001.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/setenvstor002.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/setenvstor003.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.c:57:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char enbl_scale[SCALE_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.c:58:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char ev_scale[SCALE_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/setthrdstor001.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/setthrdstor002.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/setthrdstor003.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/ap10t001.c:55:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MAX_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:64:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bytecode = fopen(filename, "rb");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/cm01t008.c:530:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/cm02t001.c:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/cm03t001.c:104:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/gf01t001.c:45:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *expected_props[PROP_NUM] = {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/gf06t001.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/hs103t002.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/hs104t001.c:48:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/hs104t002.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:55:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char chbuffer[255];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:430:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bytecode = fopen(filename, "rb");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:55:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char chbuffer[255];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:430:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bytecode = fopen(filename, "rb");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/hs202t002.c:71:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/hs203t001.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/hs203t002.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/hs203t003.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/hs203t004.c:109:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.c:70:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.c:95:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.c:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/hs204t003.c:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/hs204t004.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/hs301t001.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/hs301t002.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/hs301t003.c:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/hs301t004.c:49:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/hs301t005.c:45:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/hs302t001.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/hs302t002.c:46:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/hs302t003.c:45:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/hs302t004.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/hs302t005.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/hs302t006.c:45:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/hs302t007.c:42:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/hs302t008.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/hs302t009.c:46:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/hs302t010.c:45:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/hs302t011.c:45:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/hs302t012.c:47:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001a.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002a.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32], buffer2[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003a.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32], buffer2[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001.c:74:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001a.c:74:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001.c:81:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001a.c:81:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004a.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/sp02t001.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[256] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[256] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[256] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.c:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.c:163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.c:171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.c:71:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *sig_exp [METHCNT] = { "(I)D", "(I)F" };
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.c:72:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *name_exp[METHCNT] = { "countDownDouble", "countDownFloat" };
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.c:74:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *sign_exp[METHCNT] = { "(I)Z", "(I)B", "(I)C",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.c:76:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *name_exp[METHCNT] = { "countDownBoolean",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:141:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Raw-monitor");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:206:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:208:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:140:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/JvmtiTest.c:102:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*new_class_data, class_data, class_data_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:70:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment[3000] = ".";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:253:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(segment, "/newclass");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:148:83:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = JVMTI_ENV_PTR(jvmti)->GetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), &value);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:152:83:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = JVMTI_ENV_PTR(jvmti)->SetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), value);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:125:83:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = JVMTI_ENV_PTR(jvmti)->GetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), &value);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:130:83:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = JVMTI_ENV_PTR(jvmti)->SetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), value);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:178:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:316:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1178:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1000];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error_msg[80];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.c:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.c:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment1[3000] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment2[3000] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment1[3000] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment2[3000] = "";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:170:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(genPos, inputPos, count);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:180:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bytes, inputPos, count);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:185:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(genPos, bytes, count);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:33:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char str[15 * 20];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:41:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " ALIVE");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:45:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " TERMINATED");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:49:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " RUNNABLE");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:53:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " WAITING");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:57:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " WAITING_INDEFINITELY");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:61:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " WAITING_WITH_TIMEOUT");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:65:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " SLEEPING");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:69:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " IN_OBJECT_WAIT");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:73:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " PARKED");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:77:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " BLOCKED_ON_MONITOR_ENTER");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:81:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " SUSPENDED");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:85:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " INTERRUPTED");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:89:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " IN_NATIVE");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:245:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char file [1024];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:258:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            bytecode = fopen(file, "rb");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:113:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(names[classCount], name, name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:120:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((unsigned char*) old_class_def[classCount].class_bytes,
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c:41:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * const g_refKindStr[28] = {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c:66:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * g_szTagInfo[MAX_TAG];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c:67:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char g_tagFlags[MAX_TAG];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:43:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const g_refKindStr[28]; /* JVMTI_HEAP_REFERENCE_xxx */
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char * g_szTagInfo[MAX_TAG];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char g_tagFlags[MAX_TAG];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:508:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char file [1024];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:521:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            bytecode = fopen(file, "rb");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg_buf[1024];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:157:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg_buf2[sizeof(msg_buf)];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hex[MAX_HEX_COLUMNS * 3 + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ascii[MAX_HEX_COLUMNS + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:284:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buf, " %02X", b);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:292:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                strcat(hex, "   ");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:85:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(element->checkstr[allocs],digest,DIGESTLENGTH);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:144:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:182:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(javachars->checkstr[index++],digest,DIGESTLENGTH);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:35:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:69:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp,digest,DIGESTLENGTH);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:82:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:126:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp,digest,DIGESTLENGTH);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:46:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:114:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:179:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:245:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:309:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:374:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:440:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:505:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:570:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:637:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:703:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:769:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:834:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:900:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:965:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1031:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1098:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1164:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1229:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1295:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1361:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1427:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1493:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1559:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1624:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1690:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1757:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1823:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1889:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1955:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2021:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2087:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2153:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2219:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2284:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2351:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2418:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2484:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2551:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2618:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2684:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2751:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2817:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2883:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2949:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3016:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3083:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3149:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3215:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3282:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3349:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3416:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char r[600];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classSig[256];
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:134:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[MAX_PATH];
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:86:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(in);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:126:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int in_len = strlen(in);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:127:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int sub_len = strlen(sub);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:128:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rep_len = strlen(rep);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:138:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(out, in, p - in);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:155:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msys_path_list_end = &msys_path_list[strlen(msys_path_list)];
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:186:90:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (prefix = msys_path_list; prefix < msys_path_list_end && prefix != NULL; prefix += strlen(prefix)+1) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:236:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rc = _mktemp_s(name, strlen(name)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:260:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fwrite(fixed, strlen(fixed), 1, atout);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:265:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  files_to_delete[num_files_to_delete] = (char*) malloc(strlen(name)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:268:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  atname = (char*) malloc(strlen(name)+2);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:283:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(in_arg) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:427:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          const int msg_len = 80 + var_len + strlen(val);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:464:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      line += (ptrdiff_t) strlen(argv[i]);
data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:474:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptrdiff_t len = strlen(argv[i]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.inline.hpp:126:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline bool frame::equal(frame other) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/sharedRuntime_aarch64.cpp:1316:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(at) == 2) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:130:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  case TemplateTable::equal        : return Assembler::NE;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:1977:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (cc == equal)
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:2009:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (cc == equal)
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:246:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (_model2) sprintf(buf+strlen(buf), "(0x%03x)", _model2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp:78:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp:88:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.inline.hpp:111:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline bool frame::equal(frame other) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:168:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal        : return ne;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:2512:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (cc == equal) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:2545:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  assert(cc == equal || cc == not_equal, "invalid condition");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:2549:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (cc == equal) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.cpp:82:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.cpp:92:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:453:100:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beq(ConditionRegister crx, Label& L) { Assembler::bc(bcondCRbiIs1, bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:457:100:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bne(ConditionRegister crx, Label& L) { Assembler::bc(bcondCRbiIs0, bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:463:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beq_predict_taken    (ConditionRegister crx, Label& L) { bc(bcondCRbiIs1_bhintIsTaken,    bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:467:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bne_predict_taken    (ConditionRegister crx, Label& L) { bc(bcondCRbiIs0_bhintIsTaken,    bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:471:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beq_predict_not_taken(ConditionRegister crx, Label& L) { bc(bcondCRbiIs1_bhintIsNotTaken, bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:475:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bne_predict_not_taken(ConditionRegister crx, Label& L) { bc(bcondCRbiIs0_bhintIsNotTaken, bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:484:102:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beql(ConditionRegister crx, Label& L) { Assembler::bcl(bcondCRbiIs1, bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:488:102:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bnel(ConditionRegister crx, Label& L) { Assembler::bcl(bcondCRbiIs0, bi0(crx, equal), L); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:505:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beqctr( ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctr( bcondCRbiIs1, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:506:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beqctrl(ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctrl(bcondCRbiIs1, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:507:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bnectr( ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctr( bcondCRbiIs0, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:508:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bnectrl(ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctrl(bcondCRbiIs0, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:463:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Assembler::Condition cond = Assembler::equal;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:465:71:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_equal:        positive = true ; cond = Assembler::equal  ; is_unordered = false; break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:466:71:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_notEqual:     positive = false; cond = Assembler::equal  ; is_unordered = false; break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1564:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Assembler::Condition cond = Assembler::equal;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1566:69:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_equal:        positive = true ; cond = Assembler::equal  ; break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1567:69:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_notEqual:     positive = false; cond = Assembler::equal  ; break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1920:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ cror(combined_check, Assembler::equal, tmp_check, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1920:73:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ cror(combined_check, Assembler::equal, tmp_check, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1927:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ crandc(combined_check, Assembler::equal, combined_check, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1927:78:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ crandc(combined_check, Assembler::equal, combined_check, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1934:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1940:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1946:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:2295:74:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ bc_far_optimized(Assembler::bcondCRbiIs0, __ bi0(CCR0, Assembler::equal), *op->stub()->entry());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:3151:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:3151:59:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.cpp:415:68:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bc_far_optimized(Assembler::bcondCRbiIs1, bi0(CCR0, Assembler::equal), *Lnull);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:379:68:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ bclr(Assembler::bcondCRbiIs1, Assembler::bi0(CCR0, Assembler::equal), Assembler::bhintbhBCLRisReturn);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:484:74:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ bclr(Assembler::bcondCRbiIs1, Assembler::bi0(CCR0, Assembler::equal), Assembler::bhintbhBCLRisReturn);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:596:36:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crandc(CCR0, Assembler::equal, CCR0, Assembler::equal); // failed: CR0.ne
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:596:60:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crandc(CCR0, Assembler::equal, CCR0, Assembler::equal); // failed: CR0.ne
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp:368:72:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ bc_far_optimized(Assembler::bcondCRbiIs1, __ bi0(CCR0, Assembler::equal), *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp:389:72:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ bc_far_optimized(Assembler::bcondCRbiIs1, __ bi0(CCR0, Assembler::equal), *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1785:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1785:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1903:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1903:53:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1905:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1905:53:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.cpp:3597:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.cpp:3597:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:241:132:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void MacroAssembler::beq_far(ConditionRegister crx, Label& L, int optimize) { MacroAssembler::bc_far(bcondCRbiIs1, bi0(crx, equal), L, optimize); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:245:132:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void MacroAssembler::bne_far(ConditionRegister crx, Label& L, int optimize) { MacroAssembler::bc_far(bcondCRbiIs0, bi0(crx, equal), L, optimize); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:398:34:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      isel_0(d, CCR0, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:445:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    isel_0(d, CCR0, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/sharedRuntime_ppc.cpp:1915:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(at) == 2) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2376:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR0, Assembler::less);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2378:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR5, Assembler::equal, CCR0, Assembler::less);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2380:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR5, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2380:54:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR5, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2381:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR0, Assembler::less);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2410:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ crnand(CCR5, Assembler::equal, CCR6, Assembler::less);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2459:82:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    const int bo = Assembler::bcondCRbiIs1, bi = Assembler::bi0(CCR0, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:265:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:265:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:269:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); // Neither resolved class nor unresolved case from above?
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:269:53:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); // Neither resolved class nor unresolved case from above?
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:322:41:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ isel_0(R17_tos, CCR0, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1636:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Assembler::Condition cond = Assembler::equal;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1638:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal:         positive = true ; cond = Assembler::equal  ; break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1638:76:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal:         positive = true ; cond = Assembler::equal  ; break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1639:76:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::not_equal:     positive = false; cond = Assembler::equal  ; break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:2738:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:2738:61:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:3765:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ crnand(CCR0, Assembler::equal, CCR1, Assembler::equal); // slow path bit set or not fully initialized?
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:3765:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ crnand(CCR0, Assembler::equal, CCR1, Assembler::equal); // slow path bit set or not fully initialized?
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp:75:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp:85:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:419:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(line, system_type, strlen(system_type)) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:426:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(line, num_lpars, strlen(num_lpars)) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_MacroAssembler_s390.cpp:110:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cond_inc32(Assembler::equal,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_Runtime1_s390.cpp:725:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, return_min_jlong);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/sharedRuntime_s390.cpp:1625:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(at) == 2) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateTable_s390.cpp:176:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal :
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.cpp:74:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.cpp:84:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:305:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(_features_string) + 4 + 3*4 + 1 < sizeof(buf), "increase buffer size");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:316:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(_features_string) + 4 + 2 + 2*4 + 6 + 1 < sizeof(buf), "increase buffer size");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:637:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(march) >= hdr_len) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:660:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(march) > hdr_len) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:662:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((strlen(march)-hdr_len) >= buf_len) err = true;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:664:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          memcpy(buf, &march[hdr_len], strlen(march)-hdr_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:665:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          buf[strlen(march)-hdr_len] = '\00';
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:666:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          for (size_t i = 0; !err && (i < strlen(buf)); i++) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:292:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int length = strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:578:54:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_equal:        acond = Assembler::equal;                break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:1584:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_equal:        acond = Assembler::equal;        break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:1920:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ brx(Assembler::equal, false, Assembler::pn, *stub->entry());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:1926:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ brx(Assembler::equal, false, Assembler::pn, *stub->entry());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2107:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ br(Assembler::equal, false, Assembler::pn, *stub->entry());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2137:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ cmp_and_br_short(tmp, tmp2, Assembler::equal, Assembler::pn, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2140:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ br(Assembler::equal, false, Assembler::pn, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2142:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ brx(Assembler::equal, false, Assembler::pn, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2151:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ cmp_and_brx_short(tmp, tmp2, Assembler::equal, Assembler::pn, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2154:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ brx(Assembler::equal, false, Assembler::pn, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2156:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ brx(Assembler::equal, false, Assembler::pn, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2466:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ br(Assembler::equal, false, Assembler::pn, *failure_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2561:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, *failure_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2909:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(tmp1, tmp2, Assembler::equal, Assembler::pt, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:3277:54:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_equal:        acond = Assembler::equal;                break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:46:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  cmp_and_brx_short(temp_reg, iCache, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:111:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, false, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:251:59:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cmp_and_brx_short(t1, var_size_in_bytes, Assembler::equal, Assembler::pt, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:253:59:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cmp_and_brx_short(t1, con_size_in_bytes, Assembler::equal, Assembler::pt, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_Runtime1_sparc.cpp:509:55:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ cmp_and_brx_short(G3_t1, tag, Assembler::equal, Assembler::pt, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.inline.hpp:47:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline bool frame::equal(frame other) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:60:45:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(tmp, G0, Assembler::equal, Assembler::pt, filtered);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:141:43:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(L0, G0, Assembler::equal, Assembler::pn, refill);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:225:43:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_br_short(tmp, G0, Assembler::equal, Assembler::pt, filtered);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:247:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(pre_val, G0, Assembler::equal, Assembler::pt, filtered);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:290:72:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_br_short(O2, G1CardTable::g1_young_card_val(), Assembler::equal, Assembler::pt, young_card);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:322:43:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(L0, G0, Assembler::equal, Assembler::pn, refill);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:375:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(tmp, G0, Assembler::equal, Assembler::pt, filtered);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:526:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ brx(Assembler::equal, false, Assembler::pn, *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:549:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ brx(Assembler::equal, false, Assembler::pn, *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:593:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(tmp, G0, Assembler::equal, Assembler::pn, refill);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:641:73:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_br_short(tmp, G1CardTable::g1_young_card_val(), Assembler::equal, Assembler::pt, young_card);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:680:45:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(tmp3, G0, Assembler::equal,  Assembler::pn, refill);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/cardTableBarrierSetAssembler_sparc.cpp:52:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_done); // zero count - nothing to do
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1093:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  br(Assembler::equal, true, pn, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1223:54:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmp_and_brx_short(mark_reg, temp_reg, Assembler::equal, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1300:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    brx(Assembler::equal, true, Assembler::pn, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1360:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, false, Assembler::pt, verify_continue);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2085:57:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cmp_and_br_short(tmp1, Bytecodes::_invokedynamic, equal, pn, do_profile);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2087:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      br(equal, false, pn, do_profile);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2589:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmp_and_br_short(temp_reg, 0, equal, pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2638:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmp_and_br_short(temp_reg, 0, equal, pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1521:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case Assembler::equal:        return Assembler::rc_z;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1631:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Assembler::cbcond(equal, icc, G0, G0, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1657:6:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  br(equal, true, pt, check_low_parts);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1677:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  movcc(equal,           false, icc,  0, Rresult);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1877:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  movcc(equal,   false, xcc,  0, Rresult);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2141:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      brx(Assembler::equal,    false, Assembler::pt, L_found_method);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2282:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, false, Assembler::pn, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2314:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    brx(Assembler::equal, false, Assembler::pn, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2318:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      brx(Assembler::equal, false, Assembler::pt, *L_slow_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2328:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      brx(Assembler::equal, false, Assembler::pt, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2338:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      brx(Assembler::equal, false, Assembler::pt, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2398:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  br(Assembler::equal, false, Assembler::pn, *L_failure);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2482:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cond_inc(Assembler::equal, (address) counters->biased_lock_entry_count_addr(), mark_reg, temp_reg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2486:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, true, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2608:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, allow_delay_slot_filling, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2684:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
     brx(Assembler::equal, false, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2724:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      brx(Assembler::equal, false, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2790:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        cond_inc(Assembler::equal, (address) counters->fast_path_entry_count_addr(), Rmark, Rscratch);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2818:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        cond_inc(Assembler::equal, (address) counters->fast_path_entry_count_addr(), Rmark, Rscratch);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:3899:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  br(Assembler::equal, true, Assembler::pn, Ldone);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:3931:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, true, Assembler::pn, Ldone);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4005:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    brx(Assembler::equal, true, Assembler::pn, Ldone);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4070:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, false, Assembler::pt, target(Lloop));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4082:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  brx(Assembler::equal, true, Assembler::pt, target(Ldone));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4090:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  movcc(Assembler::equal, false, xcc, 1, result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4568:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  cmp_and_brx_short(G4, 0, Assembler::equal, Assembler::pt, L_crc32c_aligned);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4582:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  cmp_and_br_short(len, 0, Assembler::equal, Assembler::pn, L_crc32c_return);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4667:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  cmp_and_br_short(len, 0, Assembler::equal, Assembler::pt, L_crc32c_done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4705:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  cmp_and_br_short(len, 0, Assembler::equal, Assembler::pt, L_crc32c_return);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:94:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(temp_reg, temp2_reg, Assembler::equal, Assembler::pt, L_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:99:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(temp_reg, temp2_reg, Assembler::equal, Assembler::pt, L_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:114:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_br_short(temp, ref_kind, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:201:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(temp2, recv, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:243:59:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(O1_scratch, (int) iid, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:838:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, no_alternative_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:908:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ brx(Assembler::equal, false, Assembler::pt, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1558:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_zero_and_br(Assembler::equal, G3_scratch, cont);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1620:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ brx(Assembler::equal, false, Assembler::pt, is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1800:68:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(temp_reg, G5_inline_cache_reg, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1852:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, slowCase);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1912:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(at) == 2) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:2266:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:2392:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(G3_scratch, 0, Assembler::equal, Assembler::pt, no_block);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:2461:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:3027:78:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(O1, Deoptimization::Unpack_uncommon_trap, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:3144:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ movcc(Assembler::equal, false, Assembler::ptr_cc, L1, saved_O7);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:247:60:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __            cmp(type, T_OBJECT);  __ br(Assembler::equal, false, Assembler::pn, is_object);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:248:60:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ delayed()->cmp(type, T_FLOAT);   __ br(Assembler::equal, false, Assembler::pn, is_float);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:249:60:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ delayed()->cmp(type, T_DOUBLE);  __ br(Assembler::equal, false, Assembler::pn, is_double);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:250:60:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ delayed()->cmp(type, T_LONG);    __ br(Assembler::equal, false, Assembler::pn, is_long);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1157:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1265:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1368:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1706:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1841:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1973:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2738:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pt, L_objArray);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2802:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, true, Assembler::pt, entry_jbyte_arraycopy);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2806:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, true, Assembler::pt, entry_jshort_arraycopy);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2810:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, true, Assembler::pt, entry_jint_arraycopy);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2814:66:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(G3_elsize, LogBytesPerLong, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3104:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 44, Assembler::equal, Assembler::pt, L_doLast128bit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3115:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pt, L_storeOutput);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3229:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 60, Assembler::equal, Assembler::pn, L_expand256bit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3232:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_expand192bit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3412:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 44, Assembler::equal, Assembler::pt, L_cbcenc128);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3419:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pt, L_cbcenc192);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3749:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 60, Assembler::equal, Assembler::pn, L_expand256bit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3752:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_expand192bit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3848:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 44, Assembler::equal, Assembler::pn, L_dec_first_block128);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3851:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_dec_first_block192);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3917:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pt, L_cbcdec_end);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3921:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 60, Assembler::equal, Assembler::pn, L_dec_next2_blocks256);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3924:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_dec_next2_blocks192);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:5004:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Assembler::Condition cf = (iseq ? Assembler::equal : Assembler::notEqual);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:5038:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cbcond(Assembler::equal, Assembler::icc, G0, G0, next);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:127:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pt, LoadFloatArg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:131:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pt, LoadDoubleArg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:326:47:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(Gtemp, G0, Assembler::equal, Assembler::pn, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:338:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(Gtemp, G0, Assembler::equal, Assembler::pn, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:859:46:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(Otos_i, 0, Assembler::equal, Assembler::pn, slow_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:1342:65:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(G3_scratch, _thread_in_Java, Assembler::equal, Assembler::pt, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:1392:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(G3_scratch, 0, Assembler::equal, Assembler::pt, no_block);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:1972:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ breakpoint_trap(Assembler::equal, Assembler::icc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:97:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal        : return Assembler::notEqual;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:98:58:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::not_equal    : return Assembler::equal;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:145:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(temp_reg, 0, Assembler::equal, Assembler::pn, L_patch_done);  // don't patch
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:170:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ br(Assembler::equal, false, Assembler::pt, L_okay);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:172:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ br(Assembler::equal, false, Assembler::pt, L_okay);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:277:69:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(O2, JVM_CONSTANT_UnresolvedClass, Assembler::equal, Assembler::pt, call_ldc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:280:76:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmp_and_brx_short(O2, JVM_CONSTANT_UnresolvedClassInError, Assembler::equal, Assembler::pn, call_ldc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:551:72:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(G3_scratch, (int)Bytecodes::_iload, Assembler::equal, Assembler::pn, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:554:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:558:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:803:75:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(G3_scratch, (int)Bytecodes::_getfield, Assembler::equal, Assembler::pn, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:808:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:814:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:820:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ br(Assembler::equal, false, Assembler::pn, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:1266:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ br(Assembler::equal, true, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:1866:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ br(Assembler::equal, true, Assembler::pn, found);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2104:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ br(Assembler::equal, false, Assembler::pt, resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2194:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(G1_scratch, 0, Assembler::equal, Assembler::pt, Label1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2493:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(G4_scratch, 0, Assembler::equal, Assembler::pt, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2571:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ br(Assembler::equal, false, Assembler::pt, two_word);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2573:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ br(Assembler::equal, false, Assembler::pt, two_word);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2627:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(Lscratch, 0, Assembler::equal, Assembler::pt, notVolatile);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2853:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmp_and_br_short(Lscratch, 0, Assembler::equal, Assembler::pt, notVolatile);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2883:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmp_and_br_short(Lscratch, 0, Assembler::equal, Assembler::pt, exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3591:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ br(Assembler::equal, true, Assembler::pt, quicked);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3649:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ br(Assembler::equal, true, Assembler::pt, quicked);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3760:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ brx( Assembler::equal, false, Assembler::pn, exit );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3817:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ brx( Assembler::equal, true, Assembler::pt, found );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:105:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(src_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:120:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(src_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:181:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:193:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.cpp:274:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(buf) >= 2, "must be");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1420:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        case lir_cond_equal:        acond = Assembler::equal;      break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1430:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        case lir_cond_equal:        acond = Assembler::equal;       break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1526:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, *op->stub()->entry());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1690:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, *obj_is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1737:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, *success_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1744:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, *success_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1757:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, *failure_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1771:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, *failure_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1836:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1855:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, *failure_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1976:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_equal:        acond = Assembler::equal;        ncond = Assembler::notEqual;     break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1977:85:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_notEqual:     acond = Assembler::notEqual;     ncond = Assembler::equal;        break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1984:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    default:                    acond = Assembler::equal;        ncond = Assembler::notEqual;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3135:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3423:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3427:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3429:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, known_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3636:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3661:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jccb(Assembler::equal, none);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3663:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jccb(Assembler::equal, none);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3704:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3706:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3925:54:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_equal:        acond = Assembler::equal;       break;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp:72:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cond_inc32(Assembler::equal,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp:75:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:93:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:108:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:437:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:535:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:721:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, oop_empty);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:727:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, pc_empty);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:796:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, oop_empty);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:802:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, pc_empty);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:888:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:903:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:907:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:927:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, oop_empty);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:933:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, pc_empty);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:963:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, cont);                       // no
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:1128:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:1530:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, return_min_jlong);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.inline.hpp:122:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline bool frame::equal(frame other) const {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:67:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, filtered);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:178:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:187:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:195:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, runtime);       // If yes, goto runtime
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:286:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:291:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:306:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:310:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:319:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, runtime);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:432:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:446:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:483:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:555:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:559:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.cpp:126:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_already_dirty);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:168:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:176:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, runtime);       // If yes, goto runtime
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:567:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:677:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_success); // fastpath, peeking into Step 5, no need to jump
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:757:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:821:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:909:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:940:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:981:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:73:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, none);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:75:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, none);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:187:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, do_profile);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:189:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, do_profile);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:268:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:300:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:906:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:1112:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, no_reserved_zone_enabling);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:1365:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, verify_continue);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:187:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:604:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, special_case);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1173:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1312:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1330:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jccb(Assembler::equal, check_abort);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1360:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, L_done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1519:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, DONE_LABEL);        // all done if unlocked
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1617:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, DONE_LABEL) ;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1782:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cond_inc32(Assembler::equal,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1785:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, DONE_LABEL);           // Success
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1795:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cond_inc32(Assembler::equal,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2537:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2566:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2723:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2730:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2745:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2752:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2885:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, special_case);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3034:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3041:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4590:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jccb(Assembler::equal, found_method);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4689:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  local_jcc(Assembler::equal, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4712:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    local_jcc(Assembler::equal, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4715:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      local_jcc(Assembler::equal, *L_slow_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4723:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      local_jcc(Assembler::equal, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4731:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      local_jcc(Assembler::equal, *L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5506:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5528:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  cmovq(Assembler::equal, r, r12_heapbase);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5590:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5894:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6453:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, CHECK_NEXT);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6574:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, FOUND_SEQ_CHAR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6667:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, LENGTH_DIFF_LABEL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6672:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, LENGTH_DIFF_LABEL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:7226:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, TRUE_LABEL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8318:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, VECTOR8_LOOP);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8324:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, VECTOR16_LOOP);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8341:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8355:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8373:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8388:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8401:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8512:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, L_first_loop_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:10062:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  _masm->jcc(Assembler::equal, _label);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:120:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, KEY_256);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:132:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, NO_PARTS);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:140:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, REMAINDER);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:214:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:331:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, KEY_256);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:342:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, NO_PARTS);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:350:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, REMAINDER);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:425:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:750:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAVE_STATE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:956:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, END);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:1239:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, STORE_CTR);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:304:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_2_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:414:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:560:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_10_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:865:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_3_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:302:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:309:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_5_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:590:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:310:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:336:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:595:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:626:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:322:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:352:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:622:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:653:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:981:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_6_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:993:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1039:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1158:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_13_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1160:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_14_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1171:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_15_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1178:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_16_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1202:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_19_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1235:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_26_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1253:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_24_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1282:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_24_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1290:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_29_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1318:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_31_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1333:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_35_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1338:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_35_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1347:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1356:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_37_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1359:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_28_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1378:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_35_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1505:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_39_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1509:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_42_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1525:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_41_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1541:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_22_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1561:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_45_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1585:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_48_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1721:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_45_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1790:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_13_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1792:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_14_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1818:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_54_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1828:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_47_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1839:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_55_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2698:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2710:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2718:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2764:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2772:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2893:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_16_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2895:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_17_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2910:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_19_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2918:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_20_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2941:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_23_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2974:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_30_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2992:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_28_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2998:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_18_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3020:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_28_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3028:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_33_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3068:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_38_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3073:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_38_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3082:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3091:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_40_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3094:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_32_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3113:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_38_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3245:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_42_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3249:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_45_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3265:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_44_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3281:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_26_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3301:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_48_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3330:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_51_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3467:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_48_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3536:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_16_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3538:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_17_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3570:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_58_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3593:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_50_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:800:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, done_hash);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:811:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, only_one_block);   //je only_one_block
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:1359:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, done_hash);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:520:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_3_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:631:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:777:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1724:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_42);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1805:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_43);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1901:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_22);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1915:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_21);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1942:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_24);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1958:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_33);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1966:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_30);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2004:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_29);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2054:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_32);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2070:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_41);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2078:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_38);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2116:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_37);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2166:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_40);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2426:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:652:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_2_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:689:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:799:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:988:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_12_0_1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1140:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_39);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1222:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_40);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1336:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_20);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1386:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_23);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1405:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_31);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1412:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_27);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1510:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_30);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1528:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_38);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1535:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_34);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1633:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_37);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:2119:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:85:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:89:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:105:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:191:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:236:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:174:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:525:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:974:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, skip_fixup);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1076:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, nil);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1098:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, skip);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1327:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, cont);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1401:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1612:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(at) == 2) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1766:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, hit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2053:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, lock_done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2181:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, Continue);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2221:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, reguard);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2247:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2362:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2399:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2887:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:3085:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, noException);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:533:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:822:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, no_alternative_target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:961:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, ok);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:969:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, skip_fixup);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1172:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmovptr(Assembler::equal, rHandle, Address(rbp, reg2offset_in(src.first())));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1208:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmovptr(Assembler::equal, rHandle, Address(rsp, offset));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1458:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, cont);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1536:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1925:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(at) == 2) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2074:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, hit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2126:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2411:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, lock_done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2522:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, Continue);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2563:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, reguard);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2585:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2691:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2731:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2976:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:3223:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:3419:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, noException);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:164:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, skip_ldmx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:177:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:235:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, L_skip);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:239:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, L_skip);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:253:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_long);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:255:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_float);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:257:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_double);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:336:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:484:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, ok_ret);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:523:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, ok_ret);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1325:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    LOCAL_JCC(Assembler::equal, L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1332:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    LOCAL_JCC(Assembler::equal, L_success);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1730:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, L1);      // this would be broken also
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1749:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_objArray);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1818:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal, RuntimeAddress(entry_jbyte_arraycopy));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1820:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal, RuntimeAddress(entry_jshort_arraycopy));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1822:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal, RuntimeAddress(entry_jint_arraycopy));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2198:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2207:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2296:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2305:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2574:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[1]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2576:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[2]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2640:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
       __ jcc(Assembler::equal, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2791:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_key192_top);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2793:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_key256_top);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2866:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:287:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, skip_ldmx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:302:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:342:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_long);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:344:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_long);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:346:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_float);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:348:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_double);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:363:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:368:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:372:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L3);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:453:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:458:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:462:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L3);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:785:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, ok_ret);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:1151:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2375:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2677:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L1);     // this would be broken also
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2695:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_objArray);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2780:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3075:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3084:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3167:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3176:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3471:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTopHead[1]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3473:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTopHead[2]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3586:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L_exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4100:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[1]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4102:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[2]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4964:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_processdata);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:900:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1031:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1072:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, push_double);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1125:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, Continue);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1474:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:133:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  case TemplateTable::equal        : return Assembler::notEqual;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:134:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  case TemplateTable::not_equal    : return Assembler::equal;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:231:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_okay);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:233:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_okay);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:374:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, call_ldc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:379:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, call_ldc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:637:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:642:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:647:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:946:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:952:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:958:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:964:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:2119:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, done);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:2497:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, found);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:2740:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3068:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmovptr(Assembler::equal,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3071:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmovptr(Assembler::equal,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3075:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, two_word);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3077:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, two_word);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4184:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, quicked);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4247:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, quicked);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4388:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmovptr(Assembler::equal, rmon, rtop);   // cmov => cmovptr
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4392:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, exit);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4481:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, found);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:181:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, cpu486);   // if cpuid doesn't support an input
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:503:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.std_cpuid1_edx.value & flag) && strlen(_feature_edx_id[fi]) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:509:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.std_cpuid1_ecx.value & flag) && strlen(_feature_ecx_id[fi]) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:515:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.ext_cpuid1_ecx.value & flag) && strlen(_feature_extended_ecx_id[fi]) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:521:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.ext_cpuid1_edx.value & flag) && strlen(_feature_extended_edx_id[fi]) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:616:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, cpu_type_desc, cpu_desc_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:632:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, cpu_detailed_desc_buffer, cpu_detailed_desc_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:140:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, cpu486);   // if cpuid doesn't support an input
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:173:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, std_cpuid4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:189:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, std_cpuid4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:211:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, std_cpuid1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:354:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, start_simd_check); // return if AVX is not supported
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:390:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, legacy_setup);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:480:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, legacy_save_restore);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:559:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_wrapup);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:561:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_wrapup);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp:129:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp:241:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp:120:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp:237:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:224:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(fieldbuf, "next_frame", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:228:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(fieldbuf, "frame_type", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:230:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(valuebuf, "ENTRY_FRAME", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:232:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(valuebuf, "INTERPRETER_FRAME", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:234:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(valuebuf, "FAKE_STUB_FRAME", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:260:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(fieldbuf, "call_wrapper", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:290:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               field[strlen(field) - 1] == ')' ? "(": "", field);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:293:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(fieldbuf, "(vtable for istate)", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.cpp:78:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.cpp:88:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:78:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_path, path, UNIX_PATH_MAX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:291:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(s, buf+off, left);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:308:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:308:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:312:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            write_fully(s, msg, strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:334:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:345:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(arg) > AttachOperation::arg_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:442:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rc = AixAttachListener::write_fully(this->socket(), msg, strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/loadlib_aix.cpp:249:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ldi->ldinfo_filename + strlen(ldi->ldinfo_filename) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:588:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *ld_library_path = (char *)NEW_C_HEAP_ARRAY(char, strlen(v) + 1 + sizeof(DEFAULT_LIBPATH) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1213:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = ::strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1217:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ::strncpy(buf, s, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1326:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!filename || strlen(filename) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1327:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    ::strncpy(ebuf, "dll_load: empty filename specified", ebuflen - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1503:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 9", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1506:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 8", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1509:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 7", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1512:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 6 DD1.x", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1515:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 6", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1518:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 5", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1521:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 5_2", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1524:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 5_3", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1527:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_5_Compat", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1530:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_6_Compat", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1533:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_7_Compat", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1536:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_8_Compat", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1539:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_9_Compat", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1542:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "unknown", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1602:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char *p = buf + strlen(buf) - 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1629:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1639:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1652:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, sizeof(saved_jvm_path));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2499:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
          ::usleep(1000);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2616:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
size_t os::read(int fd, void *buf, unsigned int nBytes) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2617:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ::read(fd, buf, nBytes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3250:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3719:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3748:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) > MAX_PATH - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4092:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(uts.sysname, "?");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4329:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4339:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.inline.hpp:107:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RESTARTABLE( (size_t) ::read(fd, buf, (size_t) nBytes), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:159:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:159:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:159:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:574:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:624:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:629:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:629:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:631:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:663:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:663:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:666:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:689:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:721:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:1161:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:1193:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:246:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(p_name, demangled_name, namelen-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:253:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(p_name, "<nameless function>", namelen-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:274:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(p_name, lm.shortname, namelen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:75:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_path, path, UNIX_PATH_MAX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:268:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(s, buf+off, left), n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:285:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:285:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:289:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            write_fully(s, msg, strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:311:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:322:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(arg) > AttachOperation::arg_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:413:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rc = BsdAttachListener::write_fully(this->socket(), msg, strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/decoder_machO.cpp:101:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, symname, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:414:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                     strlen(v) + 1 +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:415:94:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                     sizeof(SYS_EXT_DIR) + sizeof("/lib/") + strlen(cpu_arch) + sizeof(DEFAULT_LIBPATH) + 1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:435:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t system_ext_size = strlen(user_home_dir) + sizeof(SYS_EXTENSIONS_DIR) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:507:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                     strlen(v) + 1 + strlen(l) + 1 +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:507:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                     strlen(v) + 1 + strlen(l) + 1 +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1118:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = ::strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1122:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ::strncpy(buf, s, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1321:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ::strncpy(ebuf, error_report, ebuflen-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1352:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ::strncpy(ebuf, error_report, ebuflen-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1358:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int diag_msg_max_length=ebuflen-strlen(ebuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1359:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* diag_msg_buf=ebuf+strlen(ebuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1376:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (::read(file_descriptor, &elf_head,sizeof(elf_head))));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1606:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(os, "Darwin", sizeof(os));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1608:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(os, "OpenBSD", sizeof(os));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1610:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(os, "BSD", sizeof(os));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1619:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      strncpy(release, "", sizeof(release));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1660:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(model, cpu_arch, sizeof(model));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1667:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      strncpy(machine, "", sizeof(machine));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1753:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char *p = buf + strlen(buf) - 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1777:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1788:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1800:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1813:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:2383:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
size_t os::read(int fd, void *buf, unsigned int nBytes) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:2384:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RESTARTABLE_RETURN_INT(::read(fd, buf, nBytes));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3101:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3543:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3592:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) > MAX_PATH - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3971:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.inline.hpp:109:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RESTARTABLE( (size_t) ::read(fd, buf, (size_t) nBytes), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:325:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int length = strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:458:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name_buf, sockaddr->sdl_data, name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:490:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:542:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:547:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:547:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:549:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:569:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:569:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:572:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:595:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:627:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:1073:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:1105:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:76:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_path, path, UNIX_PATH_MAX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:268:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(s, buf+off, left), n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:285:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:285:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:289:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            write_fully(s, msg, strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:311:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:322:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(arg) > AttachOperation::arg_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:413:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rc = LinuxAttachListener::write_fully(this->socket(), msg, strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:67:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(buf, _mount_point, MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:70:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            buflen = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:71:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((buflen + strlen(cgroup_path)) > (MAXPATHLEN-1)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:74:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat(buf, cgroup_path, MAXPATHLEN-buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:80:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(buf, _mount_point, MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:86:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (strlen(cgroup_path) > strlen(_root)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:86:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (strlen(cgroup_path) > strlen(_root)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:88:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(buf, _mount_point, MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:90:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                buflen = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:91:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((buflen + strlen(cgroup_path) - strlen(_root)) > (MAXPATHLEN-1)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:91:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((buflen + strlen(cgroup_path) - strlen(_root)) > (MAXPATHLEN-1)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:94:17:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
                strncat(buf, cgroup_path + strlen(_root), MAXPATHLEN-buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:94:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strncat(buf, cgroup_path + strlen(_root), MAXPATHLEN-buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:175:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(file, c->subsystem_path(), MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:177:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int filelen = strlen(file);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:178:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((filelen + strlen(filename)) > (MAXPATHLEN-1)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:182:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(file, filename, MAXPATHLEN-filelen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:238:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(f);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:475:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                     strlen(v) + 1 +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1037:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int ch = fgetc(fp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1528:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = ::strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1532:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ::strncpy(buf, s, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1553:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (filename == NULL || strlen(filename) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1788:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int diag_msg_max_length=ebuflen-strlen(ebuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1789:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* diag_msg_buf=ebuf+strlen(ebuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1806:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (::read(file_descriptor, &elf_head,sizeof(elf_head))));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1953:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ::strncpy(ebuf, error_report, ebuflen-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2016:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((bytes = ::read(fd, buf, sizeof(buf)-1)) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2193:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(distro, ptr, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2199:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(distro, ptr, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2205:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(distro, buf, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2212:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(distro, buf, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2238:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Debian ", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2243:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Linux", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2497:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char *ptr = start + strlen(search_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2498:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char *end = buf + strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2510:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(cpuinfo, ptr, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2522:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "AArch64", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2524:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "x86_64", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2526:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "ARM", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2528:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "x86_32", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2530:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "IA64", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2532:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "PPC64", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2534:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "S390", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2536:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "sparcv9", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2538:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cpuinfo, ZERO_LIBARCH, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2540:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "unknown", length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2602:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char *p = buf + strlen(buf) - 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2629:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2639:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2652:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3735:20:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          int ch = fgetc(fp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4281:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
size_t os::read(int fd, void *buf, unsigned int nBytes) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4282:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ::read(fd, buf, nBytes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4970:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5587:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5615:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) > MAX_PATH - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6008:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t ret = ::read(core_pattern_file, core_pattern, core_pattern_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6064:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ssize_t ret = ::read(core_uses_pid_file, &core_uses_pid, 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6074:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6078:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.inline.hpp:101:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RESTARTABLE( (size_t) ::read(fd, buf, (size_t) nBytes), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:989:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t num_bytes = read(fd, buf, sizeof(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:163:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(tmpdir) == 4, "No longer using /tmp - update buffer size");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:171:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:171:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:171:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:503:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:540:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(tmpdirname) == 4, "No longer using /tmp - update buffer size");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:568:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:573:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:573:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:575:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:607:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:607:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:610:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:633:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:674:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int ch = fgetc(fp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:708:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:1155:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:1187:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:171:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:171:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:501:19:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  mode_t umsk = ::umask(0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:502:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  ::umask(umsk);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:626:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prefix_len = strlen(JNI_LIB_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:627:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t suffix_len = strlen(JNI_LIB_SUFFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:631:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_len = strlen(lib_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:637:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(lib_name) <= (prefix_len + suffix_len)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:641:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_len = strlen(lib_name) - suffix_len;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:644:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (lib_name != NULL ? name_len : 0) + strlen(sym_name) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:651:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(agent_entry_name, "_");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:652:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(agent_entry_name, lib_name, name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:985:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(out, ret, outlen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1095:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(buffer, "none", size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1127:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t len = strlen(p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1437:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(p) < outbuflen) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:82:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_door_path, path, PATH_MAX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:260:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:271:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(arg) > AttachOperation::arg_length_max) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:555:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int rc = write_fully(this->socket(), msg, strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:648:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t library_path_size = info->dls_size + strlen(common_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      library_path[strlen(library_path)-1] = '\0';
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1557:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ::strncpy(ebuf, error_report, ebuflen-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1564:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int diag_msg_max_length=ebuflen-strlen(ebuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1565:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* diag_msg_buf=ebuf+strlen(ebuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1582:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (::read(file_descriptor, &elf_head,sizeof(elf_head))));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1711:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((bytes = ::read(fd, buf, sizeof(buf))) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1752:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(buf, "Solaris", buflen);  // default to plain solaris
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1764:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, ptr, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1789:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((ret = ::read(fd, mbuff, read_chunk*sizeof(prmap_t))) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1871:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1977:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char *p = buf + strlen(buf) - 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1999:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2009:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2021:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2042:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = ::strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2046:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ::strncpy(buf, s, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2907:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
size_t os::read(int fd, void *buf, unsigned int nBytes) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2912:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RESTARTABLE(::read(fd, buf, (size_t) nBytes), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2929:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RESTARTABLE(::read(fd, buf, (size_t) nBytes), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2938:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep((ms * 1000));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3565:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4365:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) > MAX_PATH - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:5456:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:5466:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:161:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:161:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:161:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:478:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:530:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:535:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:535:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:537:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:569:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:569:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:572:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "/");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:595:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:632:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      RESTARTABLE(::read(fd, addr, remaining), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:675:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:1100:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:1132:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:139:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(pipe) <= pipe_name_max, "exceeds maximum length of pipe name");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:193:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(cmd) > AttachOperation::name_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:194:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg0) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:195:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg1) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:196:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg2) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:197:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(pipename) > Win32AttachOperation::pipe_name_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:331:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fSuccess = write_pipe(hPipe, msg, (int)strlen(msg));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:364:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(counter) < sizeof(counter), "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:478:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t full_counter_path_len = strlen(object_name) + strlen(counter_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:478:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t full_counter_path_len = strlen(object_name) + strlen(counter_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:491:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    full_counter_path_len += strlen(image_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:500:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    full_counter_path_len += strlen(instance);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:521:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      full_counter_path_len += strlen(instance);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:605:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:610:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cheap_allocated_string, string, len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:691:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t pdh_IDProcess_counter_fmt_len = strlen(process_image_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:692:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pdh_IDProcess_counter_fmt_len += strlen(pdh_localized_process_object);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:693:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pdh_IDProcess_counter_fmt_len += strlen(pdh_localized_IDProcess_counter);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:768:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (count = 0, tmp = const_cast<char*>(instances); *tmp != '\0'; tmp = &tmp[strlen(tmp) + 1], count++);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:819:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t counter_len = strlen(processor);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:820:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  counter_len += strlen(counter_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:826:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (index = 0, tmp = const_cast<char*>(instances); *tmp != '\0'; tmp = &tmp[strlen(tmp) + 1], index++) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:827:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t tmp_len = strlen(tmp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:198:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(home_dir, alt_home_dir, MAX_PATH + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:215:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    home_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:223:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dll_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + strlen(bin) + 1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:223:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dll_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + strlen(bin) + 1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:257:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    sizeof(BIN_DIR) + (path_str ? strlen(path_str) : 0) + 10, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:266:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(library_path, ";");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:271:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(library_path, ";");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:275:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(library_path, ";");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:279:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(library_path, ";");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1132:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  dirp->path = (char *)malloc(strlen(dirname) + 5, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1380:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(ebuf, "Can't find dependent libraries", ebuflen - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1403:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (os::read(fd, (void*)&signature_offset, sizeof(signature_offset))))
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1412:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (sizeof(lib_arch) != (os::read(fd, (void*)&lib_arch, sizeof(lib_arch))))
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1634:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = MAX_PATH - (UINT)strlen("\\kernel32.dll") - 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1640:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
  strncat(kernel32_path, "\\kernel32.dll", MAX_PATH - ret);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1754:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(buf, "## __CPU__", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1759:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "## __CPU__", buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1885:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(java_home_var) < (size_t)buflen) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1886:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, java_home_var, buflen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1890:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1896:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1904:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, MAX_PATH);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1951:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t n = strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1953:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, s, n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:2992:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:2992:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4020:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc(stdin);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4321:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t buf_len = 1 + MAX2((size_t)3, strlen(path));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4323:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, path, buf_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4347:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prefix_len = wcslen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4348:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t result_len = prefix_len - prefix_off + wcslen(converted_path) + additional_space + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4353:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_len = wcslen(result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4527:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (wide_path[wcslen(wide_path) - 1] == L'\\') {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4528:5:  [1] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant
  character.
    wcscat(wide_path, L"*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5329:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(cmd) + strlen(cmd_prefix) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5329:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(cmd) + strlen(cmd_prefix) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5381:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(buf) < sizeof(buf) - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5522:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5566:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prefix_len = strlen(JNI_LIB_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5567:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t suffix_len = strlen(JNI_LIB_SUFFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5571:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = name_len = strlen(lib_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5586:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_len = strlen(lib_name) - suffix_len;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5589:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (lib_name != NULL ? name_len : 0) + strlen(sym_name) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5598:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(agent_entry_name, sym_name, (p - sym_name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5601:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(agent_entry_name, "_");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5602:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(agent_entry_name, lib_name, name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5607:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(agent_entry_name, "_");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5608:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(agent_entry_name, lib_name, name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp:77:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline size_t os::read(int fd, void *buf, unsigned int nBytes) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp:78:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ::read(fd, buf, nBytes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp:82:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ::read(fd, buf, nBytes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:162:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:162:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:162:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:278:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:287:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:325:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:330:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:330:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:332:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "\\");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:362:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:362:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:365:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "\\");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:398:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          latest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:448:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nbytes = (int)strlen(PERFDATA_NAME) + (int)strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:448:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nbytes = (int)strlen(PERFDATA_NAME) + (int)strlen(user) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:469:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:486:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + strlen(filename) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:486:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + strlen(filename) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:490:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(path, "\\");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:563:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(root_path, path, len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:568:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(root_path) >= 3, "device specifier too short");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1096:39:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                                DWORD umask, DWORD emask, DWORD amask) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1102:18:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  aces[0].mask = umask;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1172:50:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  return make_user_everybody_admin_security_attr(umask, emask, amask);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1193:50:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  return make_user_everybody_admin_security_attr(umask, emask, amask);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1214:50:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  return make_user_everybody_admin_security_attr(umask, emask, amask);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1607:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1640:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1641:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* robjectname = NEW_RESOURCE_ARRAY(char, strlen(objectname) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:212:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(directory);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:237:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(directory);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:242:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len_now = strlen(p);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:465:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ::strncpy(buf, pSymbol->Name, buflen - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:605:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ::strncpy(buf, p, buflen - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/prefetch_aix_ppc.inline.hpp:32:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/prefetch_bsd_x86.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/prefetch_bsd_zero.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void* loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/prefetch_linux_aarch64.inline.hpp:32:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/prefetch_linux_arm.inline.hpp:30:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/prefetch_linux_ppc.inline.hpp:32:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/prefetch_linux_s390.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void* loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/prefetch_linux_sparc.inline.hpp:30:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:43:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert(strlen(line) < sizeof(line) - 1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:341:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/prefetch_linux_x86.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/prefetch_linux_zero.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void* loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/prefetch_solaris_sparc.inline.hpp:35:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/prefetch_solaris_x86.inline.hpp:35:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/prefetch_windows_x86.inline.hpp:30:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {}
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:213:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char* buf = (char*) malloc(strlen(instr->_ident) + 4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2861:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2861:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2956:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3065:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3234:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3332:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3332:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3665:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  char *equal;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3736:40:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Interface *inter = new CondInterface(equal,         equal_format,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4465:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* result = (char *)malloc(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4465:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* result = (char *)malloc(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4465:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* result = (char *)malloc(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4528:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (pre_skip_ptr+strlen(pre_skip_ptr) != _ptr+strlen(_ptr)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4528:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (pre_skip_ptr+strlen(pre_skip_ptr) != _ptr+strlen(_ptr)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4554:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* result = (char *)malloc(strlen(location) + strlen(token2) + strlen(end_loc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4554:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* result = (char *)malloc(strlen(location) + strlen(token2) + strlen(end_loc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4554:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* result = (char *)malloc(strlen(location) + strlen(token2) + strlen(end_loc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4588:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(start) > 24) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4590:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, start, 20);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4652:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* buf = (char*) malloc(strlen(param) + 3);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5062:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( _ptr >= _curline && _ptr < _curline+strlen(_curline),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5260:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* location = (char *)malloc(strlen(file) + 100);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5314:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (eol == NULL)  eol = cp + strlen(cp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5366:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* end = token + strlen(token);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:36:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *upper  = new char[strlen(str)+1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:38:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *end    = str + strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:811:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int         length  = (int)strlen(rc_name) + (int)strlen(mask) + 5;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:811:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int         length  = (int)strlen(rc_name) + (int)strlen(mask) + 5;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:904:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   length         = (int)strlen(stack_or) + (int)strlen(reg_mask_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:904:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   length         = (int)strlen(stack_or) + (int)strlen(reg_mask_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:561:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(shared_pred_loc, shared_pred_var, strlen(shared_pred_var));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:561:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(shared_pred_loc, shared_pred_var, strlen(shared_pred_var));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:754:5:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    sprintf( string_buffer, "0");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1522:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(s, "("); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1522:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy(s, "("); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1523:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, _predicate->_pred, buflen - strlen(s) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1523:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncpy(s, _predicate->_pred, buflen - strlen(s) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1524:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1525:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(s, ")"); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1525:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy(s, ")"); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1535:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1539:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1541:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1542:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strcpy(s," == "); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1544:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1545:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(s,")"); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1545:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strcpy(s,")"); s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1550:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen(buf) < sizeof(buf), "String buffer overflow" );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:2793:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
CondInterface::CondInterface(const char* equal,         const char* equal_format,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:2802:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    _equal(equal),                 _equal_format(equal_format),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3432:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cnt = _lChild->build_instr_pred( buf+strlen(buf), name, cnt );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3437:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cnt = _rChild->build_instr_pred( buf+strlen(buf), name, cnt );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3457:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(_opType) + 4;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3462:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += (int)strlen(lstr) + (int)strlen(rstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3462:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += (int)strlen(lstr) + (int)strlen(rstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3880:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* buf = (char*) malloc(strlen(instr_ident) + 4);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.hpp:820:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  CondInterface(const char* equal,         const char* equal_format,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:96:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:100:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          AD._HPP_file._name = s; s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:103:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          AD._VM_file._name = s; s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:108:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:119:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:129:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s += strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:446:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ep = fname + strlen(fname) - 1; // start at last character and look for '.'
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:457:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(base) + (int)strlen(suffix) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:457:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(base) + (int)strlen(suffix) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:188:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      templen += 10 + (int)strlen(tmppipeopnd->_stage);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:270:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int stagelen = (int)strlen(pipeline->_stages.name(res_stages[i]-1));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:275:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    commentlen += (int)strlen(pipeline->_reslist.name(i));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:289:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      resname, max_stage - (int)strlen(resname) + 1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:350:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    commentlen += (int)strlen(pipeline->_reslist.name(i));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:430:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (int)(strlen(pipeline_use_cycle_mask) + (int)strlen(pipeline_use_element) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:430:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (int)(strlen(pipeline_use_cycle_mask) + (int)strlen(pipeline_use_element) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:523:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resource_mask) > 0)
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:764:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       resourcenamelen += (int)strlen(resourcename));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:890:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(pipeline_res_masks.name(pipeline_res_mask_index)) > 0)
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1175:11:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
          strcpy(left_reg_index, "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1188:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(right_reg_index, "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:3283:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int ident_len = (int)strlen(instr->_ident);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:3932:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp("MachCall", inst->mach_base_class(_globalNames), strlen("MachCall"))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:89:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (int j = 0; j < 20-(int)strlen(reg_def->_regname); j++) fprintf(fp_hpp, " ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:140:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(reg_def->_regname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:151:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (size_t i = strlen(reg_def->_regname); i < maxlen; i++) fprintf(fp_hpp, " ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:1361:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if( equal != NULL ) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:1362:67:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          define_oper_interface(fp, *oper, _globalNames, "equal", equal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:2220:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int stagelen = (int)strlen("undefined");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:2226:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = (int)strlen(stage);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:2257:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = (int)strlen(resource);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:636:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int klass_len = (int)strlen(klass_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:143:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const int len = (int)strlen(AOTLibrary);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:649:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(len < strlen("Index %d out of bounds for length %d"), "Must allocate more space for message.");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstanceKlass.hpp:252:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return is_in_package(packagename, (int) strlen(packagename));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.cpp:126:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name+pos, (char*)element_name->base(), element_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.cpp:139:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name+pos, (char*)element_name->base(), element_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:182:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:183:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (sscanf(_bufptr, "%i%n", &v, &read) != 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:186:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      _bufptr += read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:197:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:198:50:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (sscanf(_bufptr, INTPTR_FORMAT "%n", &v, &read) != 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:201:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      _bufptr += read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:308:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      Symbol* sym = SymbolTable::lookup(str, (int)strlen(str), CHECK_NULL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:317:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Symbol* klass_name = SymbolTable::lookup(str, (int)strlen(str), CHECK_NULL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:343:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Symbol* klass_name = SymbolTable::lookup(klass, (int)strlen(klass), CHECK_NULL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:372:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(_stream); // get next char
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:379:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(_stream);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:392:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = getc(_stream);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:471:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = getc(_stream);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:772:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Symbol* name = SymbolTable::lookup(field_name, (int)strlen(field_name), CHECK);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:773:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Symbol* sig = SymbolTable::lookup(field_signature, (int)strlen(field_signature), CHECK);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:312:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          utf8_length = (u2) strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5238:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(sig, signature, newlen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5835:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int host_pkg_len = (int)strlen(host_pkg_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp:59:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t source_len = strlen(src);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp:61:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(source_copy, src, source_len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:74:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _line_len = (int)strlen(_line);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:91:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(_line);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:194:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(option_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:155:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:156:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_to_find_len = strlen(str_to_find);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:173:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:174:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_to_find_len = strlen(str_to_find);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:234:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pkg_name, class_name_ptr, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:254:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* copy = NEW_C_HEAP_ARRAY(char, strlen(dir)+1, mtClass);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:263:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:263:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:263:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:275:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      size_t num_read = os::read(file_handle, (char*) buffer, st.st_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:298:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *copy = NEW_C_HEAP_ARRAY(char, strlen(zip_name)+1, mtClass);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:376:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t entry_name_len = strlen(version_entry) + 10 + strlen(name) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:376:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t entry_name_len = strlen(version_entry) + 10 + strlen(name) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:465:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:467:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy((char *)_name, name, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:628:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(name) < 256) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:680:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(class_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:691:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(path, &class_path[start], end - start);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:764:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Symbol* const module_sym = SymbolTable::lookup(module_name, (int)strlen(module_name), CHECK);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:769:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(class_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:779:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(path, &class_path[start], end - start);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:822:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(class_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:842:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(path, &class_path[start], end - start);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:892:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(home) + strlen(module_name) + 10;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:892:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(home) + strlen(module_name) + 10;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:953:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          msg = NEW_RESOURCE_ARRAY_IN_THREAD(thread, char, strlen(path) + 128); ;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:954:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          jio_snprintf(msg, strlen(path) + 127, "error in opening JAR file %s", path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:956:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int len = (int)(strlen(path) + strlen(error_msg) + 128);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:956:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int len = (int)(strlen(path) + strlen(error_msg) + 128);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1261:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    TempNewSymbol package_sym = SymbolTable::new_symbol(name, (int)strlen(name), CHECK_NULL);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1324:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert((int)strlen(class_name) == class_name_len, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1332:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(file_name, class_name, class_name_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1333:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(&file_name[class_name_len], class_suffix, sizeof(class_suffix));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1852:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* orig_copy = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, strlen(orig)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1859:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(out, orig, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:2039:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:2042:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, name, sizeof(buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:129:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *manifest_size = (jint)strlen(manifest);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:135:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int tag_len = (int)strlen(tag);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:184:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (cp_attr != NULL && strlen(cp_attr) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:199:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* end = file_start + strlen(file_start);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:210:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t name_len = strlen(file_start);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp:376:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(ver);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:40:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char* const end = deopt_path + strlen(deopt_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:58:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (s[0] == '-' && strncmp(s+1, ik->external_name(), strlen(s+1)) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:61:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(s, ik->external_name(), strlen(s)) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp:62:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp:165:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(classname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:151:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol name = SymbolTable::probe(name_string, (int)strlen(name_string));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:562:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(result_length == (int)strlen(result) + 1, "must match");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:1438:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int         siglen = (int) strlen(sigstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2187:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int buf_len = (int)strlen(klass_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2190:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf_len += (int)strlen(method_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2196:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_len += (int)strlen(source_file_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2203:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_len += (int)strlen(module_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2206:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf_len += (int)strlen(module_version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2219:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(buf + (int)strlen(buf), "%s@%s/", module_name, module_version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2221:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(buf + (int)strlen(buf), "%s/", module_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2236:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "%s:%d)", source_file_name, line_number);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2239:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "%s)", source_file_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2242:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "Unknown Source)");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2246:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "(nmethod " INTPTR_FORMAT ")", (intptr_t)nm);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:54:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(module_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:60:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(package_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:337:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t pkg_len = strlen(package_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:339:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pkg_name, package_name, pkg_len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:343:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:343:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:343:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:659:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(package_name) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:54:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  write(path, strlen(path) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:76:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool SharedPathsMiscInfo::read(void* ptr, size_t size) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:125:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _cur_ptr += strlen(path) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:156:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_sep_len = strlen(os::path_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:160:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t image_name_len = strlen(MODULES_IMAGE_NAME);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:206:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t dp_len = strlen(dp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:207:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t rp_len = strlen(rp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:243:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:246:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t appcp_len = strlen(appcp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:66:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read(void* ptr, size_t size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:155:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(ptr, sizeof(jint));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:158:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(ptr, sizeof(long));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:161:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(ptr, sizeof(time_t));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:443:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Symbol* result = SymbolTable::lookup_only((char*)name, (int)strlen(name), hash);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:452:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return table->basic_add(index, (u1*)name, (int)strlen(name), hash, false, THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.hpp:224:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return new_symbol(name, (int)strlen(name), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.hpp:256:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static void read(const char* filename, TRAPS);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp:592:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      create_temporary_symbol(sig, (int)strlen(sig), THREAD));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp:2979:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = (int)strlen(component_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp:2993:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = (int)strlen(component_name) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:65:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t skiplen = strlen(string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:88:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(string); // skip string body
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:178:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string += strlen(string); // skip string body
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:304:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Symbol* symbol = SymbolTable::probe(symbol_name, (int) strlen(symbol_name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:877:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(string); // skip string body
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp:181:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(name1) + strlen(name2) < sizeof(stub_id), "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp:181:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(name1) + strlen(name2) < sizeof(stub_id), "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:2231:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lineLen += (unsigned int)strlen(text1); // text1 is much shorter than MAX_INT chars.
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:2234:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lineLen += (unsigned int)strlen(text2); // text2 is much shorter than MAX_INT chars.
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:67:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  inline u_char read()                 { return _buffer[_position++]; }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:108:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  jboolean read_bool()                 { return (jboolean) read();      }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:109:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  jbyte    read_byte()                 { return (jbyte   ) read();      }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:112:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  jint     read_int()                  { jint   b0 = read();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:89:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (char *) comp_name, strlen(comp_name),                             \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:101:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (char *) comp_name, strlen(comp_name),                             \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2011:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      remaining_log = remaining_log + strlen(remaining_log);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2348:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_last_method_compiled, method_name, CompileBroker::name_buffer_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2356:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t s1len = strlen(class_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2357:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t s2len = strlen(method_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp:63:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_current_method, method, (size_t)cmname_buffer_length-1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:49:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _file = NEW_C_HEAP_ARRAY(char, strlen(file_name)+1, mtCompiler);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:228:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        bytes_read = read(partial_fd, buf, (int)nr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:238:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((bytes_read = read(partial_fd, buf, buflen-1)) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:190:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* canonicalized_list = NEW_C_HEAP_ARRAY(char, strlen(option_value) + 1, mtCompiler);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:408:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(DisableIntrinsicOption);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:410:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(local_list, DisableIntrinsicOption, length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:448:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(src->DisableIntrinsicOption) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:450:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(s, src->DisableIntrinsicOption, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:479:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* value = NEW_RESOURCE_ARRAY(char, strlen(line) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:490:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* value = NEW_RESOURCE_ARRAY(char, strlen(line) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:707:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int  c = getc(stream);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:716:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(stream);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:820:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(newName, name, i);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:97:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      size_t num_read = os::read(file_handle, (char*) buffer, st.st_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:194:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, str, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:317:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s, v->str.start, v->str.length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:378:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(s, v->str.start, v->str.length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:398:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(s, v->str.start, v->str.length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:75:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lib_offset = jvm_offset = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:168:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t taglen = strlen(tag);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:177:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t opt_so_far = strlen(_option_buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:178:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (opt_so_far + 1 + strlen(p) + 1 > sizeof(_option_buf))  return;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:281:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen((const char*)arg) > sizeof(buffer) - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:283:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buffer, (const char*)arg, sizeof(buffer) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:414:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t flen = strlen(format);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:189:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t clen = strlen(candidate_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:190:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t mlen = strlen(match_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:205:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) == 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:209:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(name, name + 1, strlen(name + 1) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:212:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:218:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3187:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  HeapWord* cur  = read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3188:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (f > read) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3189:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    cur = read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3191:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (cur == read) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.cpp:44:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp:55:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp:42:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(VerifyGCType) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp:44:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t length = strlen(VerifyGCType);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp:46:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(type_list, VerifyGCType, length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp:896:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Prefetch::read(curr, interval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.inline.hpp:50:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Prefetch::read(obj->mark_addr_raw(), (HeapWordSize*2));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.cpp:45:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepDecorator.cpp:368:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Prefetch::read(q, scan_interval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.cpp:42:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.cpp:42:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.cpp:39:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.cpp:39:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.cpp:44:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp:713:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* dup = NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp:850:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  total_size += strlen(name()) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.inline.hpp:352:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Prefetch::read(cur_obj, scan_interval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp:478:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (strlen(call->_name) > 5 &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp:479:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 !strcmp(call->_name + strlen(call->_name) - 5, "_fill")) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp:435:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        Prefetch::read(cb, oopDesc::mark_offset_in_bytes());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp:41:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.cpp:159:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len  = (format      != NULL ? (int) strlen(format)      : 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.cpp:160:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int wlen = (wide_format != NULL ? (int) strlen(wide_format) : 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:414:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_ifeq                , ubcp|____|clvm|____, itos, vtos, if_0cmp             , equal        );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:420:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_if_icmpeq           , ubcp|____|clvm|____, itos, vtos, if_icmp             , equal        );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:426:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_if_acmpeq           , ubcp|____|clvm|____, atos, vtos, if_acmp             , equal        );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:459:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_ifnull              , ubcp|____|clvm|____, atos, vtos, if_nullcmp          , equal        );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.hpp:84:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  enum Condition { equal, not_equal, less, less_equal, greater, greater_equal };
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:190:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int nof_members = JfrBigEndian::read<u2>(buffer + index - 2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:234:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int nof_values = JfrBigEndian::read<u2>(buffer + index - 2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:265:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return JfrBigEndian::read<u2>(_buffer + _current + value_relative_offset);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:294:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return JfrBigEndian::read<u2>(_buffer + number_of_elements_offset);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:299:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return _ik->constants()->symbol_at(JfrBigEndian::read<u2>(_buffer + _current));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:303:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return JfrBigEndian::read<u1>(_buffer + _current + value_type_relative_offset);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:354:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return _ik->constants()->symbol_at(JfrBigEndian::read<u2>(_buffer + _current));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1485:76:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strncmp(ik->name()->as_C_string(), new_ik->name()->as_C_string(), strlen(ik->name()->as_C_string())) == 0, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:129:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length += strlen(jvmti_error_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaCall.cpp:43:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return SymbolTable::lookup(str, (int)strlen(str), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:81:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(_buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:84:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(copy, _buffer, len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:68:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:70:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(entry.name, name, length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrOSInterface.cpp:256:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(key, variable, key_length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.cpp:222:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return JfrBigEndian::read<Return>(data);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:230:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_thread_group_name, strlen(_thread_group_name) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:240:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(tgname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:242:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_thread_group_name, tgname, len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:108:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen(resource_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:111:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(c_string, resource_str, length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:127:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen(query);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:140:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JfrCHeapObj::free(const_cast<char*>(entry->literal()), strlen(entry->literal() + 1));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:209:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t hash_len = strlen(hash_buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:213:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(anonymous_symbol) == result_len, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:215:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(anonymous_symbol) == result_len + hash_len, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:55:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static const size_t length = strlen("FlightRecorder");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:116:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CmdLine cmdline(options, strlen(options), true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:50:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:101:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t path_len = strlen(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:103:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(new_path, path, path_len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:110:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:78:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(iso8601_str) == iso8601_len, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:96:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(buffer) >= iso8601_len + 1, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:132:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t entry_len = strlen(entry);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:133:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t file_separator_length = strlen(file_separator);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:145:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(file_path_entry) == (size_t)position, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:154:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t entry_len = strlen(entry);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:163:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(entry_name, entry, entry_len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:186:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(_repo) == _repository_len, "invariant");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:260:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t pos = strlen(cwd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:276:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (Arguments::copy_expand_pid(filename_fmt, strlen(filename_fmt), &buffer[pos], JVM_MAXPATHLEN - pos)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:277:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t emergency_filename_length = strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:282:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(emergency_dump_path, buffer, emergency_filename_length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:295:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t repository_path_len = strlen(repository_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:299:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t date_time_len = strlen(date_time_buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:303:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             + strlen(chunk_file_jfr_ext) // .jfr
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:331:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    RepositoryIterator iterator(repository_path, strlen(repository_path));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:64:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:99:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:101:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t path_len = strlen(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:106:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_path, path, path_len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:276:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen((const char*)FlightRecorderOptions);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:283:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t option_length = strlen(option.name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:339:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(repo);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:344:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(repo_copy, repo, len + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:701:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t value_length = strlen(value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:708:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(startup_value, value, value_length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp:52:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static T read(const void* location);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp:114:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline T JfrBigEndian::read(const void* location) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoding.hpp:100:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = MIN2<u2>(max_jushort, (jushort)strlen(value));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp:98:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const jint len = MIN2<jint>(max_jint, (jint)strlen(value));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp:309:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = MIN2<u2>(max_jushort, (u2)strlen(value));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:145:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag* flag = JVMFlag::find_flag(cstring, strlen(cstring), /* allow_locked */ true, /* return_flag */ true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:317:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t name_buf_len = strlen(vmField.typeName) + strlen(vmField.fieldName) + 2 /* "::" */;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:317:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t name_buf_len = strlen(vmField.typeName) + strlen(vmField.fieldName) + 2 /* "::" */;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:343:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 vmField.typeString[strlen(vmField.typeString) - 1] == '*') {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:387:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag* flag = JVMFlag::find_flag(#name, strlen(#name), /*allow_locked*/ true, /* return_flag */ true); \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.cpp:116:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Symbol* name_symbol = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.cpp:117:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Symbol* signature_symbol = SymbolTable::probe(signature, (int)strlen(signature));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:518:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t detail_msg_length = strlen(buf) * 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:86:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s += strlen(s);         // Advance working string
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:100:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  } else strcat(s,"}");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:143:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:145:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t name_len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:182:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(name, LogFileOutput::Prefix, strlen(LogFileOutput::Prefix)) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:273:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(output->config_string()) > 0, "should always have a config description");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:409:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (outputstr == NULL || strlen(outputstr) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:433:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(outputstr) + strlen(implicit_output_prefix) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:433:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(outputstr) + strlen(implicit_output_prefix) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:446:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (output_options != NULL && strlen(output_options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorators.cpp:47:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (decorator_args == NULL || strlen(decorator_args) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:51:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _file_name = make_file_name(name + strlen(Prefix), _pid_str, _vm_start_time_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:80:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!isdigit(*value_str) || end != value_str + strlen(value_str) || value >= SIZE_MAX) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:123:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(filename) + number_of_digits + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:165:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (options == NULL || strlen(options) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:235:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _archive_name_len = 2 + strlen(_file_name) + _file_count_max_digits;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:393:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      first_replace_len = strlen(PidFilenamePlaceholder);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:397:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      second_replace_len = strlen(PidFilenamePlaceholder);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:405:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      first_replace_len = strlen(TimestampFilenamePlaceholder);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:409:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      second_replace_len = strlen(TimestampFilenamePlaceholder);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:413:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t first_len = strlen(first);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:414:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t second_len = strlen(second);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:417:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t result_len =  strlen(file_name) + first_len - first_replace_len + second_len - second_replace_len;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.cpp:46:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(level);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.cpp:52:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    double score = StringUtils::similarity(level, len, levelname, strlen(levelname));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:61:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _config_string_buffer_size = strlen(_config_string) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:70:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t offset = strlen(_config_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logPrefix.hpp:108:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(ret == 0 || strlen(buf) < len, \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logPrefix.hpp:110:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(ret == 0 || strlen(buf) == ret || ret >= len, \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.cpp:48:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.cpp:54:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    double score = StringUtils::similarity(tagname, strlen(tagname), str, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:141:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int version_len = (int)strlen(vm_version);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:154:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(header_version, vm_version, JVM_IDENT_MAX-9);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:248:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:410:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strncmp((const char*)attr, name, strlen(name)) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:415:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, (char*)value, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:508:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t n = os::read(fd, _header, (unsigned int)sz);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:576:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = os::read(fd, _paths_misc_info, (unsigned int)info_size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.cpp:302:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char x = start[strlen(col_name)];
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.hpp:334:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int min = (int)(strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:1674:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int class_list_path_len = (int)strlen(class_list_path_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp:786:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(VerifySubSet) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp:1198:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(VerifySubSet);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp:1200:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(subset_list, VerifySubSet, length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:1925:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str, (char *) (bytes+2), len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:2143:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int       len = (int) strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:711:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!equal(cts)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:734:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    change = change || !v.equal(bbts[i]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:758:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      change = change || !v.equal(bbts[i]);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1763:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (match.equal(_state[i])) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1772:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      if (match.equal(_state[i])) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1821:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (!actual.is_lock_reference() || !expected.equal(actual)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1969:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (out[0].equal(CellTypeState::ref) && out[1].equal(CellTypeState::bottom)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1969:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (out[0].equal(CellTypeState::ref) && out[1].equal(CellTypeState::bottom)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.hpp:224:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(CellTypeState a) const     { return _state == a._state; }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:947:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t msglen = strlen(desc) + strlen(className) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:947:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t msglen = strlen(desc) + strlen(className) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2586:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hash_len = (int)strlen(hash_buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2591:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int src_length = (int)strlen(src);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2751:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(other_pkg == NULL || strlen(other_pkg) > 0, "package name is empty string");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:88:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:655:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t addr_len = strlen(addr_buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:659:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(result) == name_len, "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:661:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(result) == name_len + addr_len, "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:841:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(class1_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:844:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(class2_description);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:846:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(" and ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:872:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(klass_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:888:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen(module_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:894:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len += strlen(version) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:912:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(loader_name_and_id);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:933:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(parent_loader_phrase) + strlen(parent_loader_name_and_id);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:933:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(parent_loader_phrase) + strlen(parent_loader_name_and_id);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:937:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += ((use_are) ? strlen(" are in ") : strlen(" is in "));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:937:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += ((use_are) ? strlen(" are in ") : strlen(" is in "));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:938:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(module_name_phrase) + strlen(" of loader ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:938:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(module_name_phrase) + strlen(" of loader ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:151:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int klass_name_len  = (int)strlen(klass_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:166:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:172:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.cpp:93:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (::strncmp(classname, prefix, strlen(prefix)) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp:180:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int   length = (int)strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp:195:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   length = (int)strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp:192:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bool equals(const char* str) const { return equals(str, (int) strlen(str)); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp:197:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return starts_with(prefix, (int) strlen(prefix));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp:203:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return index_of_at(i, str, (int) strlen(str));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:531:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (endcn == NULL)  endcn = name + strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2142:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return buf+strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2175:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return buf+strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:230:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  if (buf[0] == 0)  strcat(buf, ",");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:4493:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_print_inlining_output, ss.base(), end+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:149:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      _stream->read(&c, 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1028:24:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            bool uup = umask.is_UP();
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1033:18:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            if( !umask.is_AllStack() &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1034:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                (int)umask.Size() <= lrgs(useidx).num_regs() &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1036:31:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                 (!is_vect && umask.is_misaligned_pair()))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1080:33:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
              if( dmask.overlap(umask) ) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1117:34:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                  RegMask tmp_rm(umask);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp:622:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(SWPointer& q)        { return equal(cmp(q)); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp:622:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(SWPointer& q)        { return equal(cmp(q)); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp:625:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(int cmp)      { return cmp == Equal; }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.cpp:35:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:326:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int str_len = (int)strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:392:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((int)strlen(name) > Symbol::max_length()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:1328:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol name = SymbolTable::probe(name_to_probe, (int)strlen(name_to_probe));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:1329:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol signature = SymbolTable::probe(sig, (int)strlen(sig));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2034:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol fieldname = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2035:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol signame = SymbolTable::probe(sig, (int)strlen(sig));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2269:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol fieldname = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2270:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol signame = SymbolTable::probe(sig, (int)strlen(sig));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2941:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int prefix_len = (int)strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:3022:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int meth_name_len = (int)strlen(meth_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:3028:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    TempNewSymbol  signature = SymbolTable::probe(meth_sig, (int)strlen(meth_sig));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:480:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:1554:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(result) + 1; // + 1 for NULL termination
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:769:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || (int)strlen(name) > Symbol::max_length()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:793:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || (int)strlen(name) > Symbol::max_length()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:831:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((int)strlen(name) > Symbol::max_length()) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:911:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int str_len = (int)strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:973:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int str_len = (int)strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:312:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(ik()->source_debug_extension());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:853:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol sym = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1666:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1692:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1705:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return search_prefix_name_space(0, name_str, strlen(name_str),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:814:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1189:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    info_ptr->name = (char *) jvmtiMalloc(strlen(n)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1438:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    info_ptr->name = (char*)jvmtiMalloc(strlen(name)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2378:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      result = (char *) jvmtiMalloc(strlen(class_sig)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2391:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          jvmtiError err = allocate(strlen(gen_sig) + 1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2444:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *source_name_ptr = (char *) jvmtiMalloc(strlen(sfncp)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2824:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *source_debug_extension_ptr = (char *) jvmtiMalloc(strlen(sde)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2881:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *name_ptr =  (char*) jvmtiMalloc(strlen(fieldName) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2890:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *signature_ptr = (char*) jvmtiMalloc(strlen(fieldSignature) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2901:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jvmtiError err = allocate(strlen(gen_sig) + 1, (unsigned char **)generic_ptr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2960:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *name_ptr = (char *) jvmtiMalloc(strlen(utf8_name)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2967:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *signature_ptr = (char *) jvmtiMalloc(strlen(utf8_signature) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2977:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jvmtiError err = allocate(strlen(gen_sig) + 1, (unsigned char **)generic_ptr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3138:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        name_buf = (char *) jvmtiMalloc(strlen(utf8_name)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3142:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sig_buf = (char *) jvmtiMalloc(strlen(utf8_signature)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3148:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          gen_sig_buf = (char *) jvmtiMalloc(strlen(utf8_gen_sign)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3693:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      err = allocate((strlen(key)+1) * sizeof(char), (unsigned char**)tmp_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3723:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = allocate((strlen(value)+1) * sizeof(char), (unsigned char **)value_ptr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:458:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* prefix_copy = NEW_RESOURCE_ARRAY(char, strlen(prefix)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1172:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *dup_str = (char*)allocate(strlen(str)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.hpp:427:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_name, name, sizeof(_name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:110:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(id)+1, (unsigned char**)&(ext_funcs[i].id));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:117:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(desc)+1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:141:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        err = rt.allocate(strlen(src_params[j].name)+1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:198:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(id)+1, (unsigned char**)&(ext_events[i].id));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:205:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(desc)+1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:229:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        err = rt.allocate(strlen(src_params[j].name)+1,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiImpl.cpp:613:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int) strlen(ty_sign);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.cpp:59:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = strcpy(NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal), name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3760:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3786:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3799:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return search_prefix_name_space(0, name_str, strlen(name_str),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:4141:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (int)strlen(scratch_class->source_debug_extension()));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:87:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(curr) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:96:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  very_end = curr + strlen(curr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:112:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      flags_end = flags + strlen(flags);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:192:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              size_t fnlen = strlen(fname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:221:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t evtlen = strlen(ename);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.cpp:1119:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(name) + 50;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.cpp:1197:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        str += strlen(str) + 1;   // skip name and null
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:485:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:493:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int wrapper_name_len = (int)strlen(wrapper_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:54:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol enumSigSymbol = SymbolTable::lookup(enum_sig, (int) strlen(enum_sig), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:155:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CmdLine cmdline(c_cmdline, strlen(c_cmdline), true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:168:77:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    GenDCmdArgument* arg = parser.lookup_dcmd_option(parsedArgNames->at(i), strlen(parsedArgNames->at(i)));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:1119:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag* result = JVMFlag::find_flag(flag_name, strlen(flag_name), true, true);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:1893:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(field_name != NULL && strlen(field_name) > 0, "Field name not valid");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:1902:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol name_symbol = SymbolTable::lookup(field_name, (int) strlen(field_name),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:125:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _value = AllocateHeap(strlen(value)+1, mtArguments);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:140:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:142:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen(_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:164:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _value = AllocateHeap(strlen(value)+1, mtArguments);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:178:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(module_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:180:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_module_name, module_name, len); // copy the trailing null
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:199:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _key = AllocateHeap(strlen(key)+1, mtArguments);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:210:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = AllocateHeap(strlen(name)+1, mtArguments);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:215:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _options = AllocateHeap(strlen(options)+1, mtArguments);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:230:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:804:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (remainder == s || strlen(remainder) > 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:885:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag* result = JVMFlag::find_flag(name, strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:944:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t old_len = old_value != NULL ? strlen(old_value) : 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:945:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t new_len = strlen(new_value);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1009:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(tagset_buffer, "+", max_tagset_len - strlen(tagset_buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1009:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(tagset_buffer, "+", max_tagset_len - strlen(tagset_buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1011:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(tagset_buffer, LogTag::name(tagSet[i]), max_tagset_len - strlen(tagset_buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1011:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(tagset_buffer, LogTag::name(tagSet[i]), max_tagset_len - strlen(tagset_buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1014:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(tagset_buffer, "*", max_tagset_len - strlen(tagset_buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1014:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(tagset_buffer, "*", max_tagset_len - strlen(tagset_buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1176:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length += strlen(args[i]) + 1; // add 1 for a space or NULL terminating character
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1181:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t offset = strlen(args[j]) + 1; // add 1 for a space or NULL terminating character
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1202:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    st->print_cr("java_class_path (initial): %s", strlen(path) == 0 ? "<not set>" : path );
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1260:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    arg_len = strlen(argname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1299:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(locked_message_buf) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1361:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getc(stream);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1393:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(stream);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2009:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg) == 0 || strcasecmp(arg, "NONE") == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2175:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prop_len = strlen(prop_name) + strlen(prop_value) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2175:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prop_len = strlen(prop_name) + strlen(prop_value) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2194:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prop_len = strlen(prop_base_name) + strlen(prop_value) + max_digits + extra_symbols_count;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2194:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prop_len = strlen(prop_base_name) + strlen(prop_value) + max_digits + extra_symbols_count;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2298:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _len_prefix = strlen(JNI_LIB_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2305:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _len_jdwp = strlen(_jdwp);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2474:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = (pos == NULL) ? strlen(tail) : pos - tail;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2480:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len2 = strlen(pos+1) + 1; // options start after ':'.  Final zero must be copied.
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2566:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(tail) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3024:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((strncmp(tail, "Flags=", strlen("Flags=")) != 0) &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3025:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (strncmp(tail, "VMOptionsFile=", strlen("VMOptionsFile=")) != 0)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3106:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (char* tail = copy + strlen(copy) - 1; tail >= copy && *tail == separator; tail--) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3361:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int retcode = parse_options_buffer(name, buffer, strlen(buffer), vm_args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3411:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t bytes_read = ::read(fd, (void *)buf, (unsigned)bytes_alloc);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3537:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t jvm_path_len = strlen(jvm_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3538:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t file_sep_len = strlen(os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3824:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    code = parse_options_buffer("vm options resource", vmoptions, strlen(vmoptions), &initial_vm_options_args);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4325:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t ext_path_length = strlen(ext_path_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4345:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(ext_path_str) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldType.cpp:81:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(element);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:670:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(d.name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:929:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_len = strlen(_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:941:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    score = StringUtils::similarity(current->_name, strlen(current->_name), name, length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:990:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag* result = JVMFlag::find_flag((char*)name, strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:120:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag* find_flag(const char* name) { return find_flag(name, strlen(name), true, true); };
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:217:143:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error boolAt(const char* name, bool* value, bool allow_locked = false, bool return_flag = false)      { return boolAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:220:116:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error boolAtPut(const char* name, bool* value, JVMFlag::Flags origin)   { return boolAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:223:140:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error intAt(const char* name, int* value, bool allow_locked = false, bool return_flag = false)      { return intAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:226:113:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error intAtPut(const char* name, int* value, JVMFlag::Flags origin)   { return intAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:229:143:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error uintAt(const char* name, uint* value, bool allow_locked = false, bool return_flag = false)      { return uintAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:232:116:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error uintAtPut(const char* name, uint* value, JVMFlag::Flags origin)   { return uintAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:235:143:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error intxAt(const char* name, intx* value, bool allow_locked = false, bool return_flag = false)      { return intxAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:238:116:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error intxAtPut(const char* name, intx* value, JVMFlag::Flags origin)   { return intxAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:241:144:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error uintxAt(const char* name, uintx* value, bool allow_locked = false, bool return_flag = false)    { return uintxAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:244:117:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error uintxAtPut(const char* name, uintx* value, JVMFlag::Flags origin) { return uintxAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:247:147:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error size_tAt(const char* name, size_t* value, bool allow_locked = false, bool return_flag = false)    { return size_tAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:250:120:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error size_tAtPut(const char* name, size_t* value, JVMFlag::Flags origin) { return size_tAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:253:150:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error uint64_tAt(const char* name, uint64_t* value, bool allow_locked = false, bool return_flag = false) { return uint64_tAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:256:126:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error uint64_tAtPut(const char* name, uint64_t* value, JVMFlag::Flags origin) { return uint64_tAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:259:147:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error doubleAt(const char* name, double* value, bool allow_locked = false, bool return_flag = false)    { return doubleAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:262:120:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error doubleAtPut(const char* name, double* value, JVMFlag::Flags origin) { return doubleAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:265:144:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error ccstrAt(const char* name, ccstr* value, bool allow_locked = false, bool return_flag = false)    { return ccstrAt(name, strlen(name), value, allow_locked, return_flag); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:269:117:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static JVMFlag::Error ccstrAtPut(const char* name, ccstr* value, JVMFlag::Flags origin) { return ccstrAtPut(name, strlen(name), value, origin); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp:623:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp:1304:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fv.description = NEW_RESOURCE_ARRAY(char, strlen(description) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.hpp:118:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(frame other) const;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp:1158:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(m->_name, name, MONITOR_NAME_LEN - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2276:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = strlen(Key);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2278:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (Search = kvList; *Search; Search += strlen(Search) + 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2312:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t sz = strlen(SyncKnobs);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:286:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:286:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:286:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:289:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t pnamelen = pname ? strlen(pname) : 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:295:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const size_t plen = strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:308:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t plen = (path == NULL) ? 0 : strlen(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:609:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t size = strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:619:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    vm_exit_out_of_memory(strlen(str) + 1, OOM_MALLOC_ERROR, "os::strdup_check_oom");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1278:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(mode) + 1 < sizeof(modified_mode), "mode chars plus one extra must fit in buffer");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1301:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int home_len = (int)strlen(home);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1339:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (path == NULL || strlen(path) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1343:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* inpath = (char*)NEW_C_HEAP_ARRAY(char, strlen(path) + 1, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1373:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, p, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:589:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static size_t read(int fd, void *buf, unsigned int nBytes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_perf.hpp:213:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t length = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_perf.hpp:216:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_name, name, length + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:88:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = NEW_C_HEAP_ARRAY(char, strlen(name) + strlen(prefix) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:88:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = NEW_C_HEAP_ARRAY(char, strlen(name) + strlen(prefix) + 2, mtInternal);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:89:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(_name != NULL && strlen(name) != 0, "invalid name");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:129:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t namelen = strlen(name()) + 1;  // include null terminator
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:233:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy((char *)_valuep, s2 == NULL ? "" : s2, _length);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:247:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  MIN2((jint)(strlen((char*)initial_value)+1),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:253:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ((jint)strlen(initial_value) > (jint)PerfMaxStringConstLength)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:259:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (jint)strlen(initial_value),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:367:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(ns) + strlen(name) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:367:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(ns) + strlen(name) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:428:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (max_length == 0 && s != NULL) max_length = (int)strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.hpp:724:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return strncmp(name, javadot, strlen(javadot)) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.hpp:728:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return strncmp(name, comdot, strlen(comdot)) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfMemory.cpp:252:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(!Arguments::copy_expand_pid(PerfDataSaveFile, strlen(PerfDataSaveFile),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/prefetch.hpp:45:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static void read(void* loc, intx interval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:601:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 100 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:601:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 100 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:602:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:602:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:612:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 160 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:612:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 160 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:613:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*sizeof(uintx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:628:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 118 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:628:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 118 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:629:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:629:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:629:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:639:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 170 + strlen(current_class_name) + strlen(new_class_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:639:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 170 + strlen(current_class_name) + strlen(new_class_name) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:640:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          2*strlen(module_to_name) + strlen(package_name) + 2*sizeof(uintx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:640:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          2*strlen(module_to_name) + strlen(package_name) + 2*sizeof(uintx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:98:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1990:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1990:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1990:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:2920:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValue.hpp:95:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(StackValue *value) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:153:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(name);                                                  \
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:2772:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bool only_at = strlen(DeoptimizeOnlyAt) > 0;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:2786:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:3460:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Prefetch::read((void*)addr, prefetch_interval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4077:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4077:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4077:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4078:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(ebuf) + strlen(sub_msg2) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4078:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(ebuf) + strlen(sub_msg2) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.inline.hpp:49:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Prefetch::read((void*)current_p, scan_interval);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:520:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prefixed_name_len = strlen(prefixed_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:529:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t name_len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:536:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t possible_prefix_len = strlen(possible_prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:677:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!locs->at(i)->equal(other_locs->at(i)))
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:686:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!exprs->at(i)->equal(other_exprs->at(i)))
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3131:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(typeName);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3134:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, typeName, len - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3145:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start = typeName + strlen("GrowableArray<");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3147:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start = typeName + strlen("Array<");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3153:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, start, len - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3163:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char * s = typeName + strlen("const ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp:159:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   (char *) op->name(), strlen(op->name()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp:409:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (char *) op->name(), strlen(op->name()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp:419:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (char *) op->name(), strlen(op->name()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:338:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strncmp(line, keywords_to_match[i], strlen(keywords_to_match[i])) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:227:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (arg1 != NULL && (strlen(arg1) > 0)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:264:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (arg0 != NULL && (strlen(arg0) > 0)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:310:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag* f = JVMFlag::find_flag((char*)name, strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:377:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert(strlen(name) <= AttachOperation::name_length_max, "operation <= name_length_max");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:125:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(name) <= name_length_max, "exceeds maximum name length");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:126:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = MIN2(strlen(name), (size_t)name_length_max);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:143:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(arg) <= arg_length_max, "exceeds maximum argument length");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:144:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = MIN2(strlen(arg), (size_t)arg_length_max);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:49:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ptr, str, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:97:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t next_size = strlen(next_str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:107:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(buf, ",");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:122:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, str, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:131:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:148:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len == strlen("true") && strncasecmp(str, "true", len) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:150:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (len == strlen("false") && strncasecmp(str, "false", len) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:156:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, str, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:166:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:190:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:236:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_value._unit, &str[idx], len - idx);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:267:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:342:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:161:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                  strlen(cmd_list->at(i)));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:171:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                strlen(_cmd.value()));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:202:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                  strlen(cmd_list->at(i)));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:326:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t opt_len = strlen(_libpath.value()) + strlen(_option.value()) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:326:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t opt_len = strlen(_libpath.value()) + strlen(_option.value()) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:211:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(argbuf, iter.key_addr(), len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:226:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(arg->name()) == len &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:501:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(factory->name()) == len &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.hpp:85:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   : _str(str), _delim(delim), _len(::strlen(str)),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/dtraceAttacher.cpp:54:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag::boolAtPut((char*)flag, strlen(flag), &value,
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1819:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  writer()->write_raw((void*)header, (int)strlen(header));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1939:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(path != NULL && strlen(path) > 0, "path missing");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1997:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* str = NEW_RESOURCE_ARRAY(char, strlen(error())+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2049:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      (HeapDumpPath == NULL ? 0 : strlen(HeapDumpPath)) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2050:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(os::file_separator()) + max_digit_chars +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2051:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(dump_file_name) + strlen(dump_file_ext) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2051:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(dump_file_name) + strlen(dump_file_ext) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2070:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t fs_len = strlen(os::file_separator());
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2071:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(base_path) >= fs_len) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2073:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          end += (strlen(base_path) - fs_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2082:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t dlen = strlen(base_path);  // if heap dump dir specified
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2086:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(base_path) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2092:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(my_path, base_path, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2095:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(base_path) + max_digit_chars + 2; // for '.' and \0
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp:1546:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      JVMFlag* flag = JVMFlag::find_flag(str, strlen(str));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp:2013:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             strlen(cmd_name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:230:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) name(), strlen(name()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:231:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) pool->name(), strlen(pool->name()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:261:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) name(), strlen(name()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:262:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) pool->name(), strlen(pool->name()),
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:38:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(buffer, src, TEMP_BUF_SIZE - 1 - strlen(buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:38:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncat(buffer, src, TEMP_BUF_SIZE - 1 - strlen(buffer));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:49:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t j = strlen(buffer);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:253:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JVMFlag* f = JVMFlag::find_flag((char*)name, strlen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.inline.hpp:267:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Prefetch::read(*pref->value(), 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.inline.hpp:274:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Prefetch::read(*next_pref->value(), 0);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:142:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int file_name_len = (int)strlen(file_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:73:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      mfd.read(_section_data, shdr.sh_size)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:82:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool FileReader::read(void* buf, size_t size) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:114:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(filepath) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:195:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!freader.read(&_elfHdr, sizeof(_elfHdr))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:211:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (!freader.read(&shdr, sizeof(shdr))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:263:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:277:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (!mfd.read((void*)&hdr, sizeof(hdr))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.hpp:103:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read(void* buf, size_t size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFuncDescTable.cpp:68:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        !mfd.read((void*)&addr, sizeof(addr))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfStringTable.cpp:66:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      mfd.read((void*)buf, size_t(buflen))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfSymbolTable.cpp:99:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (!mfd.read((void*)&sym, sizeof(sym))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.hpp:107:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(_buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_gcc.hpp:227:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_gcc.hpp:227:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_sparcWorks.hpp:237:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_sparcWorks.hpp:237:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp:117:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read  _read
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_xlc.hpp:126:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_xlc.hpp:126:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:41:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return tmp == NULL ? s + strlen(s) : tmp;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:350:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int tokens, read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:357:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  tokens = sscanf(pos, "%lf%n", &double_value, &read);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:360:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    assert(read > 0, "sanity");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:374:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    skip(read);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:452:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(valid_chars);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:480:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(expected_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:94:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_len = strlen(result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:99:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_len = strlen(result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:372:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(copy, buffer, buffer_pos);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:393:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int i = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:417:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length = strlen(force_directory) + strlen(os::file_separator()) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:417:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length = strlen(force_directory) + strlen(os::file_separator()) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:418:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(basename) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:420:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length = strlen(log_name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:428:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length += strlen(pid_text);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:434:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length += strlen(tms);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:445:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(buf, "");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:482:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int buf_pos = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:487:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(&buf[buf_pos], nametail, first);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:489:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_pos = (int)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:491:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(&buf[buf_pos], tail, second - first - 2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:555:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  data[::strlen(data)-1] = '\0';
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1029:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(copy, buffer, buffer_pos);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1064:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int networkStream::read(char *buf, size_t len) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:100:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   void print_raw(const char* str)            { write(str, strlen(str)); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:102:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   void print_raw_cr(const char* str)         { write(str, strlen(str)); cr(); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:234:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t read(void *data, size_t size, size_t count) { return ::fread(data, size, count, _file); }
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:304:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int read(char *buf, size_t len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp:31:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t from_len = strlen(from);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp:32:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t to_len = strlen(to);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp:39:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(dst, left_over, strlen(left_over) + 1); // copies the trailing 0 of <left_over>
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:451:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert((int) strlen(result) == utf8_len, "length prediction must be correct");
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:153:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(coredump_message, message, sizeof(coredump_message));
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:176:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(_detail_msg) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:501:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           if (strlen(_detail_msg) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:507:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           if (strlen(_detail_msg) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:568:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (strlen(_detail_msg) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1206:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (Arguments::copy_expand_pid(pattern, strlen(pattern), &buf[pos], buflen - pos)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1231:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t pos = strlen(cwd);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1243:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (tmpdir != NULL && strlen(tmpdir) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:155:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t tag_len = (tag_end == NULL) ? strlen(tag) : tag_end - tag;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:191:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _element_close_stack_ptr = (cur_tag += strlen(cur_tag) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:199:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _element_close_stack_ptr = cur_tag + strlen(cur_tag) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:352:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t format_len = strlen(format);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnet/aix_close.c:340:11:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
          usleep(num_woken * 50);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/ch/AixPollPort.c:165:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, 1), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:141:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((char*)vm + vm->vmt_data[VMT_OBJECT].vmt_off);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:152:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((char*)vm + vm->vmt_data[VMT_STUB].vmt_off);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:200:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(fstype);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:211:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((char*)vm + vm->vmt_data[VMT_ARGS].vmt_off);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:155:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
    strncat(fn, "/cmdline", sizeof fn - strnlen(fn, sizeof fn) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:194:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        while ((count = read(fd, s, pageSize - cmdlen)) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:194:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:201:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:208:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fstype);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:215:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(options);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:91:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int langStrLen = strlen(languageString);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:107:25:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                        strcat(languageString, "-");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:167:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int length = strlen(scriptRegion);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:374:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int c_len = strlen(c_exception);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:401:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(c_exception+c_len, "|*.", 3);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:402:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(c_exception+c_len+3, c_exception, c_len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:485:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sProps->protocol##Port = malloc(strlen(buf) + 1);                   \
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:486:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(jvm_cfg, selfInfo.dli_fname, MAXPATHLEN);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:494:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(path, jvm_cfg, pathsize);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:506:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t pathLen = strlen(realPathToSelf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:191:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            protoLen = strlen(cproto);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:192:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            hostLen = strlen(chost);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:201:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                urlRef = CFURLCreateWithBytes(NULL, (const UInt8 *) uri, strlen(uri),
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:165:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:172:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:179:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fstype);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:186:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(options);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:218:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jsize len = strlen(buf.f_mntonname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:311:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((len = (cname != NULL ? strlen(cname) : 0) + strlen(syms[i]) + 2) >
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:311:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((len = (cname != NULL ? strlen(cname) : 0) + strlen(syms[i]) + 2) >
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:477:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prefixLen = strlen(JNI_LIB_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:478:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t suffixLen = strlen(JNI_LIB_SUFFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:494:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:511:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    libName[strlen(libName)-suffixLen] = '\0';
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:435:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int prefix_len = (int) strlen(JNI_LIB_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:436:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int suffix_len = (int) strlen(JNI_LIB_SUFFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:188:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t messagelen = message == NULL ? 0 : strlen(message);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:478:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:518:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:590:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int) strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:753:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:235:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int str_length = (int) strlen(string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:272:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            int str_length = (int) strlen(pkg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:291:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            int clazz_length = (int) strlen(clazz);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:300:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        desc_length = (int) strlen(desc_string);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:162:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* replaced = new char[(int) strlen(package_name) + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:172:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* path = new char[(int) strlen(radical) + (int) strlen(package_name) + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:172:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* path = new char[(int) strlen(radical) + (int) strlen(package_name) + 1];
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:353:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     int len = (int) strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:356:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_name, name, len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:443:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (u8)osSupport::read(_fd, (char*)data, size, offset) == size;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:497:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(module);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:502:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(next, module, length); next += length;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:510:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(parent);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:514:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(next, parent, length); next += length;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:520:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(base);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:524:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(next, base, length); next += length;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:530:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(extension);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:535:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(next, extension, length); next += length;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:117:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t moduleNameLen = strlen(module_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:118:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nameLen = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/osSupport.hpp:62:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    static jlong read(jint fd, char *buf, jlong nBytes, jlong offset);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:611:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ctx.eob = case_data + strlen(case_data);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:71:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define JLI_StrLen(p1)          strlen((p1))
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:78:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define JLI_StrNCpy(p1, p2, p3) strncpy((p1), (p2), (p3))
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:69:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((size_t)(read(fd, in, (unsigned int)entry->csize)) != entry->csize) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:140:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            && read(fd, buf, count) == (jlong) count);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:253:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, eb, ENDHDR) < 0)
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:278:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((bytes = read(fd, buffer, (unsigned int)len)) < 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:373:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((bytes = read(fd, bp, MINREAD)) < 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:395:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((res = read(fd, bp + bytes, MINREAD)) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:407:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((res = read(fd, bp + bytes,  read_size)) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:425:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read(fd, locbuf, LOCHDR) < 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:216:1:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
equal(const char *s1, const char *s2)
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:227:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        (equal(filename + len - 3, "jar") ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:228:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         equal(filename + len - 3, "JAR")) &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:340:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (equal((*argv)[i], "-cp") ||
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:341:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            equal((*argv)[i], "-classpath")) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:640:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bucket->name = malloc(strlen(name) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:701:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bucket->name = malloc(strlen(name) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2122:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (   p = stack_operands + strlen(stack_operands);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_format.c:235:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unsigned int length = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:127:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fname_length = strlen(fname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:181:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(zfd, buf, nbytes);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:803:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) >= PATH_MAX) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1148:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return ZIP_GetEntry2(zip, name, (jint)strlen(name), JNI_FALSE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1474:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *nameLenP = (jint)strlen(entry->name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:72:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define read _read
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:223:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:629:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:629:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:635:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:635:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:59:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = read(state->fd, buf + *have, get);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:394:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:450:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:548:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1099:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
    strncat(result, " [deoptimized frame]; ", size - strlen(result) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1099:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(result, " [deoptimized frame]; ", size - strlen(result) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1101:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
    strncat(result, " [compiled] ", size - strlen(result) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1101:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(result, " [compiled] ", size - strlen(result) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1210:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(result, name, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1213:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(result, "<unknown BufferBlob>", size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1221:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(result, name, size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1224:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(result, "<unknown CodeBlob>", size);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:130:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, len), ret);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:372:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(PROTOCOL_VERSION) + strlen(cstr) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:372:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(PROTOCOL_VERSION) + strlen(cstr) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:377:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pos += strlen(PROTOCOL_VERSION)+1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:392:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t len = strlen(cstr);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:111:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:118:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:125:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fstype);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:132:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(options);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:321:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t count = read(fd, buf, CHUNK_SIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessEnvironment_md.c:74:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            jsize valLength = strlen(valBeg);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:447:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cp += strlen(cp) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:714:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(prargs, psinfo.pr_psargs, PRARGSZ);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:721:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(prargs, psinfo.pr_fname, PRARGSZ);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:184:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t pathsize = strlen(path) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:258:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fmtsize = sizeof(IOE_FORMAT) + strlen(detail) + 3 * sizeof(errnum);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:316:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bytes += strlen(*a)+1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:334:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(*a) +1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:425:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sp.dirlen = c->pdir == 0 ? 0 : strlen(c->pdir)+1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:97:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return pos + strlen(zidir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:109:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path = (char *) malloc(strlen(dir) + strlen(name) + 2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:109:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path = (char *) malloc(strlen(dir) + strlen(name) + 2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:113:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    return strcat(strcat(strcpy(path, dir), "/"), name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:228:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        RESTARTABLE(read(fd, dbuf, size), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:277:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:343:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, size), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:457:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            RESTARTABLE(read(iop->fd, (void *)iop->buffer, BUFFER_SIZE), len);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:647:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, size), res);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:670:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t tz_key_len = strlen(tz_key);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:703:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tz_len = (temp_tz == NULL) ? strlen(tz) : temp_tz - tz;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:709:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(java_home_dir) + 15) > PATH_MAX) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:111:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p += strlen(p) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:197:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(original) > PATH_MAX) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:215:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(path, original, PATH_MAX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:218:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        end = path + strlen(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:249:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int rn = strlen(r);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:250:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (rn + (int)strlen(p) >= len) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:149:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t n = read(fd, buf, remaining);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:254:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int filelen = strlen(file);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:259:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int dirlen = strlen(dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c:103:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *p = (char *)ps + strlen(ps) - 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c:170:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, len), result);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:114:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp = malloc(strlen(lc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:145:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp = malloc(strlen(lc) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:177:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    encoding_variant = malloc(strlen(temp)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:196:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        temp = realloc(temp, strlen(p)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:205:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        encoding_variant = realloc(encoding_variant, strlen(temp)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:240:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *std_language = malloc(strlen(language)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:248:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *std_country = malloc(strlen(country)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:445:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            char *os_version = malloc(strlen(name.version) +
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:446:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen(name.release) + 2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:449:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(os_version, ".");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:57:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(jniEntryName, "_");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:67:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjimage/osSupport_unix.cpp:66:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
jlong osSupport::read(jint fd, char *buf, jlong nBytes, jlong offset) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:268:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (s != NULL && strlen(s) <= strlen(chost)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:268:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (s != NULL && strlen(s) <= strlen(chost)) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:269:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strcasecmp(chost+(strlen(chost) - strlen(s)), s) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:269:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strcasecmp(chost+(strlen(chost) - strlen(s)), s) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:371:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    protoLen = strlen(cproto);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:372:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hostLen = strlen(chost);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:247:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(searchName, name_utf, IFNAMESIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:888:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, if_name, IFNAMESIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:951:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(currif->name, name, IFNAMESIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:983:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(currif->name, vname, IFNAMESIZE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1212:16:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
        while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1250:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, name, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1276:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1299:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1313:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1487:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(if6.ifr_name, ifreqP->ifr_name, sizeof(if6.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1580:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1594:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1644:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1801:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.lifr_name, name, sizeof(if2.lifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1887:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1936:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1950:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2083:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, name, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2133:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2147:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:156:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (buf, param, sizeof(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:430:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(format) + strlen(hostname) + strlen(error_string) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:430:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(format) + strlen(hostname) + strlen(error_string) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:430:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(format) + strlen(hostname) + strlen(error_string) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:537:12:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %02x "
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:610:20:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
            while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:656:12:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    while (fscanf (f, "%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x "
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1038:12:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %02x "
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1125:20:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
            while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n",
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileDispatcherImpl.c:85:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, read(fd, buf, len), JNI_TRUE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:121:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int n = read(fd, buf, sizeof(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:137:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    res = read(fd, buf, 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c:131:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(uts.sysname, "?");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixCopyFile.c:61:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        RESTARTABLE(read((int)src, &buf, sizeof(buf)), n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:322:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jsize len = (jsize)strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:339:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(tmpbuf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:492:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read((int)fd, bufp, (size_t)nbytes), n);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:787:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jsize len = strlen(ptr->d_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:926:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (jsize)strlen(target);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:947:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jsize len = (jsize)strlen(resolved);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:1088:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            jsize len = strlen(p->pw_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:1140:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            jsize len = strlen(g->gr_name);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:255:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (*env)->NewString(env, pattern, (jsize)wcslen(pattern));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:291:57:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        tmp_string = (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:301:61:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            tmp_string = (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:388:50:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ret = (*env)->NewString(env, pattern, (jsize)wcslen(pattern));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:428:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:491:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:512:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:575:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:753:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:844:66:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                tmp_string = (*env)->NewString(env, name, (jsize)wcslen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:862:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), number);      // "+12.34"
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:864:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), fix);         // "+12.34$"
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:865:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), L";");        // "+12.34$;"
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:867:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), fix);         // "+12.34$;("
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:868:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), number);      // "+12.34$;(12.34"
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:870:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), fix);         // "+12.34$;(12.34$)"
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:1066:60:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        (*env)->NewString(env, era, (jsize)wcslen(era)));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:1075:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    jsize len = (jsize)wcslen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:479:47:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       (jsize)wcslen(exeName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:486:55:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               (jsize)wcslen(longPath));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:530:63:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s = (*env)->NewString(env, (const jchar *)str, (jsize)wcslen(str));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:533:9:  [1] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant
  character.
        wcscat(domain, L"\\");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:535:66:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s = (*env)->NewString(env, (const jchar *)domain, (jsize)wcslen(domain));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:443:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mapFileName = malloc(strlen(java_home_dir) + strlen(MAPPINGS_FILE) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:443:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mapFileName = malloc(strlen(java_home_dir) + strlen(MAPPINGS_FILE) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:259:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = (int)wcslen(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:265:60:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    rv = (*env)->NewString(env, cp, (jsize)wcslen(cp));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:272:63:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            rv = (*env)->NewString(env, canonicalPath, (jsize)wcslen(canonicalPath));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:291:28:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int len = (int)wcslen(canonicalPrefix) + MAX_PATH;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:298:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      rv = (*env)->NewString(env, cp, (jsize)wcslen(cp));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:307:67:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                rv = (*env)->NewString(env, canonicalPath, (jsize)wcslen(canonicalPath));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:666:36:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    search_path = (WCHAR*)malloc(2*wcslen(pathbuf) + 6);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:685:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int)wcslen(search_path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:697:9:  [1] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant
  character.
        wcscat(search_path, L"*");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:728:41:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 (jsize)wcslen(find_data.cFileName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:877:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ret = (*env)->NewString(env, p, (jsize)wcslen(p));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:183:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (wcslen(p) > 4 && !wcsncmp(p, L"\\\\.\\", 4))
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:246:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(orig_path) >= MAX_PATH) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:292:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *p = path + strlen(path);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:337:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(path) == 3 && path[1] == ':' && path[2] == '\\') {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:363:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                fd.cFileName + strlen(fd.cFileName)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:370:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (!(dst = cp(dst, dend, '\0', src, src + strlen(src)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:415:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       canonicalPrefix + strlen(canonicalPrefix)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:420:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       fd.cFileName + strlen(fd.cFileName)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:425:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!(dst = cp(dst, dend, '\0', src, src + strlen(src)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:520:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((pathlen = (int)wcslen(path)) > MAX_PATH - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:532:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            fd.cFileName + wcslen(fd.cFileName)))){
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:539:61:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               if (!(dst = wcp(dst, dend, L'\0', src, src + wcslen(src)))){
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:579:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((pathlen=(int)wcslen(pathWithCanonicalPrefix)) > MAX_PATH - 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:590:43:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        canonicalPrefix + wcslen(canonicalPrefix)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:595:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        fd.cFileName + wcslen(fd.cFileName)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:600:58:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!(dst = wcp(dst, dend, L'\0', src, src + wcslen(src)))) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:66:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dirp->path = (char *)malloc(strlen(dirname) + 5);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:95:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            dirlen = (int)wcslen(dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:106:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                curDirLenCached = (int)wcslen(dir);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:156:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pathlen = (int)wcslen(ps);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:490:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      &read,      /* number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:499:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (jint)read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:125:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(systemPath) + strlen(gb18030Font) < MAX_PATH + 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:125:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(systemPath) + strlen(gb18030Font) < MAX_PATH + 1) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:182:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(ret, "-");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:293:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(*script) != 4) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:420:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = MAX_PATH - (UINT)strlen("\\kernel32.dll") - 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:425:13:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings. Risk is low because the source is a
  constant string.
            wcsncat(kernel32_path, L"\\kernel32.dll", MAX_PATH - ret);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:606:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (uname != NULL && wcslen(uname) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:749:49:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (*env)->NewString(env, wcstr, (jsize)wcslen(wcstr));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:47:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(path, "\\");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:54:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(path, "\\");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:59:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(jniEntryName, sym, (p - sym));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:62:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(jniEntryName, "_");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:68:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(jniEntryName, "_");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:67:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
jlong osSupport::read(jint fd, char *buf, jlong nBytes, jlong offset) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:283:13:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = getchar();
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:326:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char* cptr = (char*) malloc(strlen(argv[0]) + sizeof(char) * 3 + strlen(cmdline) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:326:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char* cptr = (char*) malloc(strlen(argv[0]) + sizeof(char) * 3 + strlen(cmdline) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:512:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        wnamelen = strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:526:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        wfullnamelen = wcslen(wfullname);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:528:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            elplen = wcslen(ELP_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DefaultProxySelector.c:271:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t maxlen = wcslen(s);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DefaultProxySelector.c:331:71:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    jhost = (*env)->NewString(env, head->host, (jsize)wcslen(head->host));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c:123:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AuthId.UserLength = (unsigned long) strlen( pUser );
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c:128:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AuthId.PasswordLength = (unsigned long) strlen( pPassword );
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c:133:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AuthId.DomainLength = (unsigned long) strlen( pDomain );
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:278:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            curr->name = (char *)malloc(strlen(dev_name) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:302:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(curr->displayName, ifrowP->bDescr, ifrowP->dwDescrLen);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:545:47:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       (jsize)wcslen ((PWCHAR)ifs->displayName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:356:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        nif->name = malloc (strlen(newname)+1);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:357:52:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        nif->displayName = malloc (wcslen(ptr->FriendlyName)*2+2);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:542:48:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        (jsize)wcslen ((PWCHAR)ifs->displayName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:62:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s1)+1;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:65:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len + strlen(s2) > MAX_STR_LEN)     /* insufficient space */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:69:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(s1, " ");
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:113:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(result) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:179:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    if (((ret != ERROR_SUCCESS) || (strlen(result) == 0)) &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:200:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (((ret != ERROR_SUCCESS) || (strlen(result) == 0)) &&
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:65:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:84:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:113:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:135:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertLongReturnVal(env, (jlong)read, JNI_TRUE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:57:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      &read,      /* number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:70:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:97:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                          &read,            /* number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:99:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:100:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            totalRead += read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:102:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read < num) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:151:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      &read,            /* number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:174:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:172:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                          &read,      /* number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:183:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:184:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            totalRead += read;
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/Iocp.c:145:70:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, (const jchar *)message, (jsize)wcslen(message));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:65:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:79:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:118:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:135:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertLongReturnVal(env, (jlong)read, JNI_TRUE);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/RegistryFileTypeDetector.c:54:36:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                jsize len = (jsize)wcslen((WCHAR*)data);
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:180:70:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, (const jchar *)message, (jsize)wcslen(message));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:313:70:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring name = (*env)->NewString(env, data.cFileName, (jsize)wcslen(data.cFileName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:346:63:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, data->cFileName, (jsize)wcslen(data->cFileName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:364:72:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring name = (*env)->NewString(env, data.cStreamName, (jsize)wcslen(data.cStreamName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:387:64:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, data.cStreamName, (jsize)wcslen(data.cStreamName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:542:72:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str = (*env)->NewString(env, (const jchar *)fileSystemName, (jsize)wcslen(fileSystemName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:546:68:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str = (*env)->NewString(env, (const jchar *)volumeName, (jsize)wcslen(volumeName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:629:73:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, (const jchar *)volumeName, (jsize)wcslen(volumeName));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:829:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = (*env)->NewString(env, (const jchar *)domain, (jsize)wcslen(domain));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:834:60:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = (*env)->NewString(env, (const jchar *)name, (jsize)wcslen(name));
data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:883:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (jsize)wcslen(string));
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2513:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  return strncpy(dest, src, n);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2535:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return static_cast<int>(read(fd, buf, count));
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:67:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (s.compare(0, strlen(prefix), prefix) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:68:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    std::string::size_type end = s.find("::", strlen(prefix));
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:71:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s.erase(strlen("std"), end - strlen("std"));
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:71:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s.erase(strlen("std"), end - strlen("std"));
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:656:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t full_regex_len = strlen(regex) + 10;
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:910:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(regex);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc:334:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PrintCharsAsStringTo(s, strlen(s), os);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc:351:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PrintCharsAsStringTo(s, std::wcslen(s), os);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:907:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int length = strlen(ansi);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:1873:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    num_chars = static_cast<int>(wcslen(str));
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3665:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      segment = next_segment + strlen("]]>");
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:4250:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result.reserve(strlen(str) + 1);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5569:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5981:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (temp_dir[strlen(temp_dir) - 1] == '\\')
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:50:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strncmp(str, prefix, strlen(prefix)) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:54:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t suffix_len = strlen(suffix);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:55:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:126:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(argv[i], "-jdk", strlen(argv[i])) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:130:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return argv[i] + strlen("--jdk=");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:133:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return argv[i] + strlen("-jdk:");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:143:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const char* v = argv[i] + strlen("-new-thread");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:144:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(v) == 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:227:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen("/lib/jli/libjli.dylib") + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:227:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen("/lib/jli/libjli.dylib") + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:235:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen(java_home_var) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:235:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen(java_home_var) + 2;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp:101:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  while (ret != NULL && buf[strlen(buf) - 1] != '\n' && !feof(fp)) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp:125:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t match_len = strlen(substrs[idx]);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:100:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ASSERT_LT(strlen(expected_buf), sizeof(expected_buf));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:101:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ret = jio_snprintf(expected_buf + strlen(expected_buf),
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:102:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         sizeof(expected_buf) - strlen(expected_buf),
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:104:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(expected_buf) > 0 ? "," : "",
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:62:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  EXPECT_EQ(3, read) << "Invalid uptime decoration: " << uptime;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:136:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ASSERT_EQ(7, read) << "Invalid format: " << timestr;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:173:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ASSERT_EQ(9, read) << "Invalid format: " << timestr;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp:114:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(filename) + 3;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:148:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t i = strlen(start_marker); i < size; i++) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:151:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sprintf(data + size - strlen(end_marker) - 1, "%s", end_marker);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:187:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t prefix_len = strlen(prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logStream.cpp:100:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_TRUE(strlen(line_buffer) == 1*M - 1);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:166:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      if (equal) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:38:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jio_snprintf(expected + strlen(expected),
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:39:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 sizeof(expected) - strlen(expected),
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:61:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jio_snprintf(expected + strlen(expected),
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:62:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 sizeof(expected) - strlen(expected),
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_guardedMemory.cpp:137:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_sz = strlen(str) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:110:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = wcslen(to_copy);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:116:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return dest + wcslen(to_copy);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:286:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    os::snprintf(buf, JVM_MAXPATHLEN, "%d", (int) wcslen(path));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:303:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t buf_len = strlen(buf);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:371:56:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  printf("Checking \"%ls\" (%d chars):\n", path, (int) wcslen(path));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:372:64:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  printf("_wfullpath             %ls (%d chars)\n", abs, (int) wcslen(abs));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:432:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int cwd_len = (int) wcslen(cwd);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:433:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int dir_prefix_len = (int) wcslen(dir_prefix);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:41:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static const size_t len_lorem = strlen(lorem);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:77:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_TRUE(strncmp(expected, buffer, strlen(expected)) == 0);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:92:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_TRUE(strncmp(expected, buffer, strlen(expected)) == 0);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_stringUtils.cpp:32:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_NEAR(0.95349, StringUtils::similarity(str1, strlen(str1), str2, strlen(str2)), 1e-5);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_stringUtils.cpp:32:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_NEAR(0.95349, StringUtils::similarity(str1, strlen(str1), str2, strlen(str2)), 1e-5);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:39:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 9) << "string should be truncated here";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:42:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 15) << "string should be truncated here";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:45:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 18) << "string should be truncated here";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:49:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 3 * 19) << "string should end here";
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:239:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  optlen = strlen(CLASS_PATH_OPT) + strlen(javaclasspath) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:239:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  optlen = strlen(CLASS_PATH_OPT) + strlen(javaclasspath) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c:172:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(path, argv[1], PATH_MAX);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/handshake/libHandshakeTransitionTest.c:38:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(ms*1000);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:98:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *fieldName = (char *)malloc(strlen(name) + 16);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:66:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t n = strlen(FROM);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:119:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(to) == strlen(from) &&
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:119:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(to) == strlen(from) &&
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:120:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(class_name) > 0 &&
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:121:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(to) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent00.c:55:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(optionsString);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent01.c:58:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(optionsString);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/framepop002.c:90:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strncmp(inf.name, TEST_THREAD_NAME_BASE, strlen(TEST_THREAD_NAME_BASE)) == 0;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.c:239:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (ind == 4 || strlen(inf.name) ==
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.c:240:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(thrInfo[ind].thrNames[i])));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c:117:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].id != NULL && strlen(extList[i].id) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c:143:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].short_description != NULL && strlen(extList[i].short_description) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c:160:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            || strlen(extList[i].params[j].name) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c:128:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].id != NULL && strlen(extList[i].id) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c:154:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].short_description != NULL && strlen(extList[i].short_description) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c:171:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            || strlen(extList[i].params[j].name) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/getthrdgrpchld001.c:247:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t threadNameLen = strlen(expectedThreadName);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.c:101:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (ind < 2 && strlen(inf.name) != strlen(threads[ind].name))) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.c:101:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (ind < 2 && strlen(inf.name) != strlen(threads[ind].name))) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.c:263:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(value_length != (jint) wcslen(STRING)) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.c:268:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  wcslen(STRING));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/HeapFilter.c:284:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    field->size = (int) wcslen((wchar_t*)field->value);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/resumethrdlst001.c:178:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/resumethrdlst002.c:193:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:95:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.c:123:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fld_name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.c:125:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len != strlen(fields[0].name) || !isdigit(fld_name[len - 1])) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.c:119:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fld_name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.c:121:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len != strlen(fields[0].name) || !isdigit(fld_name[len - 1])) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/setlocal004.c:87:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(table[i].name) != 1) continue;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/suspendthrdlst001.c:170:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/suspendthrdlst002.c:185:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.c:66:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(rec->name, name, NAME_LENGTH);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.c:81:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(rec->name, name, NAME_LENGTH);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:463:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:498:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:463:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:498:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:216:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t PFX_LEN = strlen(TEST_THREAD_NAME_PREFIX);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:225:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(thr_info->name) < PFX_LEN ||
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:158:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:104:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:207:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:212:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment, options, (size_t) sizeof(segment)/sizeof(char));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:112:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:127:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:96:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:131:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:131:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:211:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/heapref.c:427:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t len = strlen(classSig);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/refignore.c:425:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t len = strlen(classSig);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:161:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:135:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:175:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment1, p_segment1, (size_t) sizeof(segment1)/sizeof(char));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:182:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment2, p_segment2, (size_t) sizeof(segment2)/sizeof(char));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:175:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment1, p_segment1, (size_t) sizeof(segment1)/sizeof(char));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:182:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment2, p_segment2, (size_t) sizeof(segment2)/sizeof(char));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:1067:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        u2 len = (u2) strlen(str);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:107:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        name_len = (jint) strlen(name) + 1;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:402:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    package_name_length = strlen(package_name);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:77:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(value) > 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:83:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(value) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:101:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(value) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:150:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(name, opt, opt_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:152:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(value, val, val_len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:226:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(options);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:233:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(context.options.string, options, len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:333:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:358:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) <= 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:159:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(msg_buf2, msg_buf, sizeof(msg_buf2));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:165:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (strlen(msg_buf2) != 0) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:166:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msg_buf2[strlen(msg_buf2)-1] = '\n'; // Make sure we have a newline char at the end.
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:77:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(element->str[allocs]) !=
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:81:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strsize += strlen(element->str[allocs])+1;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:82:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (k = 0; k < strlen(element->str[allocs]); k++) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:101:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            for (k=0; k < strlen(element->str[j]); k++) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:229:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (!equal) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:86:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jint strlen;
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:98:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str = (char *)malloc(strlen*sizeof(char));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:113:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i=0;i<strlen;i++)
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:116:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i=0;i<strlen; i++) {
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:43:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(*dst, pStr, len);
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:69:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mn->methodName, szName, sizeof(mn->methodName));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:70:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mn->classSig, szSignature, sizeof(mn->classSig));
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:149:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(path, "\\");
data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:160:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(path, "\\");

ANALYSIS SUMMARY:

Hits = 5713
Lines analyzed = 1576946 in approximately 38.73 seconds (40711 lines/second)
Physical Source Lines of Code (SLOC) = 1047664
Hits@level = [0] 15391 [1] 2385 [2] 1851 [3] 204 [4] 1256 [5]  17
Hits@level+ = [0+] 21104 [1+] 5713 [2+] 3328 [3+] 1477 [4+] 1273 [5+]  17
Hits/KSLOC@level+ = [0+] 20.1439 [1+] 5.45308 [2+] 3.17659 [3+] 1.4098 [4+] 1.21508 [5+] 0.0162266
Dot directories skipped = 3 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.