Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/complex.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_copy.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/forkmode.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/multiformat.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/simgrid.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/vector_scal_c.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/vector_scal_cpu.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/vector_scal_cuda.c
Examining data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/vector_scal_opencl.c
Examining data/starpu-1.3.7+dfsg/doc/tutorial/hello_world.c
Examining data/starpu-1.3.7+dfsg/doc/tutorial/hello_world_msvc.c
Examining data/starpu-1.3.7+dfsg/doc/tutorial/vector_scal.c
Examining data/starpu-1.3.7+dfsg/doc/tutorial/vector_scal_cpu.c
Examining data/starpu-1.3.7+dfsg/doc/tutorial/vector_scal_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/api/bcsr_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/block_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/coo_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/csr_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/matrix_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/multiformat_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/variable_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/vector_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/api/void_data_interface.c
Examining data/starpu-1.3.7+dfsg/examples/axpy/axpy.c
Examining data/starpu-1.3.7+dfsg/examples/axpy/axpy.h
Examining data/starpu-1.3.7+dfsg/examples/axpy/axpy_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/block.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/block_cpu.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/block_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/dynamic_handles.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/hello_world.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/mult.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat_conversion_codelets.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat_conversion_codelets_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat_types.h
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/task_insert_color.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/topology.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/variable.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/variable_kernels_cpu.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/variable_kernels_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/vector_scal.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/vector_scal_c.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/vector_scal_cpu.c
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/vector_scal_cpu_template.h
Examining data/starpu-1.3.7+dfsg/examples/basic_examples/vector_scal_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/binary/binary.c
Examining data/starpu-1.3.7+dfsg/examples/callback/callback.c
Examining data/starpu-1.3.7+dfsg/examples/callback/prologue.c
Examining data/starpu-1.3.7+dfsg/examples/cg/cg.c
Examining data/starpu-1.3.7+dfsg/examples/cg/cg.h
Examining data/starpu-1.3.7+dfsg/examples/cg/cg_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky.h
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_compil.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_compiled.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_grain_tag.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_implicit.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_models.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_tag.c
Examining data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_tile_tag.c
Examining data/starpu-1.3.7+dfsg/examples/common/blas.c
Examining data/starpu-1.3.7+dfsg/examples/common/blas.h
Examining data/starpu-1.3.7+dfsg/examples/common/blas_model.c
Examining data/starpu-1.3.7+dfsg/examples/common/blas_model.h
Examining data/starpu-1.3.7+dfsg/examples/cpp/add_vectors.cpp
Examining data/starpu-1.3.7+dfsg/examples/cpp/add_vectors_cpp11.cpp
Examining data/starpu-1.3.7+dfsg/examples/cpp/add_vectors_interface.cpp
Examining data/starpu-1.3.7+dfsg/examples/cpp/incrementer_cpp.cpp
Examining data/starpu-1.3.7+dfsg/examples/dependency/sequential_consistency.c
Examining data/starpu-1.3.7+dfsg/examples/dependency/task_end_dep.c
Examining data/starpu-1.3.7+dfsg/examples/dependency/task_end_dep_add.c
Examining data/starpu-1.3.7+dfsg/examples/filters/custom_mf/conversion_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_conversion_codelets.c
Examining data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_interface.c
Examining data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_interface.h
Examining data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_mf_filter.c
Examining data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_types.h
Examining data/starpu-1.3.7+dfsg/examples/filters/fblock.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fblock_cpu.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fblock_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fmatrix.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fmultiple_manual.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit_implicit.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit_readonly.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fplan_notautomatic.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fread.c
Examining data/starpu-1.3.7+dfsg/examples/filters/frecursive.c
Examining data/starpu-1.3.7+dfsg/examples/filters/fvector.c
Examining data/starpu-1.3.7+dfsg/examples/filters/shadow.c
Examining data/starpu-1.3.7+dfsg/examples/filters/shadow2d.c
Examining data/starpu-1.3.7+dfsg/examples/filters/shadow3d.c
Examining data/starpu-1.3.7+dfsg/examples/fortran/StarPU_fortran.h
Examining data/starpu-1.3.7+dfsg/examples/fortran/hello_c.c
Examining data/starpu-1.3.7+dfsg/examples/fortran90/marshalling.c
Examining data/starpu-1.3.7+dfsg/examples/gl_interop/gl_interop.c
Examining data/starpu-1.3.7+dfsg/examples/gl_interop/gl_interop_idle.c
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.c
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.h
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_grain.c
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_tag.c
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_sparse_cg.c
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_sparse_cg.h
Examining data/starpu-1.3.7+dfsg/examples/heat/dw_sparse_cg_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/heat/heat.c
Examining data/starpu-1.3.7+dfsg/examples/heat/heat.h
Examining data/starpu-1.3.7+dfsg/examples/heat/heat_display.c
Examining data/starpu-1.3.7+dfsg/examples/heat/lu_kernels_model.c
Examining data/starpu-1.3.7+dfsg/examples/heat/lu_kernels_model.h
Examining data/starpu-1.3.7+dfsg/examples/incrementer/incrementer.c
Examining data/starpu-1.3.7+dfsg/examples/incrementer/incrementer_kernels_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/interface/complex.c
Examining data/starpu-1.3.7+dfsg/examples/interface/complex_codelet.h
Examining data/starpu-1.3.7+dfsg/examples/interface/complex_filters.c
Examining data/starpu-1.3.7+dfsg/examples/interface/complex_interface.c
Examining data/starpu-1.3.7+dfsg/examples/interface/complex_interface.h
Examining data/starpu-1.3.7+dfsg/examples/interface/complex_kernels_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/lu/blas_complex.c
Examining data/starpu-1.3.7+dfsg/examples/lu/blas_complex.h
Examining data/starpu-1.3.7+dfsg/examples/lu/clu.c
Examining data/starpu-1.3.7+dfsg/examples/lu/clu_implicit.c
Examining data/starpu-1.3.7+dfsg/examples/lu/clu_implicit_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/clu_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/lu/clu_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/complex_double.h
Examining data/starpu-1.3.7+dfsg/examples/lu/complex_float.h
Examining data/starpu-1.3.7+dfsg/examples/lu/dlu.c
Examining data/starpu-1.3.7+dfsg/examples/lu/dlu_implicit.c
Examining data/starpu-1.3.7+dfsg/examples/lu/dlu_implicit_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/dlu_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/lu/dlu_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/lu-double.h
Examining data/starpu-1.3.7+dfsg/examples/lu/lu-float.h
Examining data/starpu-1.3.7+dfsg/examples/lu/lu_example.c
Examining data/starpu-1.3.7+dfsg/examples/lu/lu_example_complex_double.c
Examining data/starpu-1.3.7+dfsg/examples/lu/lu_example_complex_float.c
Examining data/starpu-1.3.7+dfsg/examples/lu/lu_example_double.c
Examining data/starpu-1.3.7+dfsg/examples/lu/lu_example_float.c
Examining data/starpu-1.3.7+dfsg/examples/lu/slu.c
Examining data/starpu-1.3.7+dfsg/examples/lu/slu_implicit.c
Examining data/starpu-1.3.7+dfsg/examples/lu/slu_implicit_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/slu_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/lu/slu_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/xlu.c
Examining data/starpu-1.3.7+dfsg/examples/lu/xlu.h
Examining data/starpu-1.3.7+dfsg/examples/lu/xlu_implicit.c
Examining data/starpu-1.3.7+dfsg/examples/lu/xlu_implicit_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/xlu_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/lu/xlu_kernels.h
Examining data/starpu-1.3.7+dfsg/examples/lu/xlu_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/zlu.c
Examining data/starpu-1.3.7+dfsg/examples/lu/zlu_implicit.c
Examining data/starpu-1.3.7+dfsg/examples/lu/zlu_implicit_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/lu/zlu_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/lu/zlu_pivot.c
Examining data/starpu-1.3.7+dfsg/examples/mandelbrot/mandelbrot.c
Examining data/starpu-1.3.7+dfsg/examples/matvecmult/matvecmult.c
Examining data/starpu-1.3.7+dfsg/examples/mlr/mlr.c
Examining data/starpu-1.3.7+dfsg/examples/mult/dgemm.c
Examining data/starpu-1.3.7+dfsg/examples/mult/double.h
Examining data/starpu-1.3.7+dfsg/examples/mult/sgemm.c
Examining data/starpu-1.3.7+dfsg/examples/mult/simple.h
Examining data/starpu-1.3.7+dfsg/examples/mult/xgemm.c
Examining data/starpu-1.3.7+dfsg/examples/openmp/vector_scal_omp.c
Examining data/starpu-1.3.7+dfsg/examples/pi/pi.c
Examining data/starpu-1.3.7+dfsg/examples/pi/pi.h
Examining data/starpu-1.3.7+dfsg/examples/pi/pi_redux.c
Examining data/starpu-1.3.7+dfsg/examples/pipeline/pipeline.c
Examining data/starpu-1.3.7+dfsg/examples/ppm_downscaler/ppm_downscaler.c
Examining data/starpu-1.3.7+dfsg/examples/ppm_downscaler/ppm_downscaler.h
Examining data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c
Examining data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.h
Examining data/starpu-1.3.7+dfsg/examples/profiling/profiling.c
Examining data/starpu-1.3.7+dfsg/examples/reductions/dot_product.c
Examining data/starpu-1.3.7+dfsg/examples/reductions/dot_product.h
Examining data/starpu-1.3.7+dfsg/examples/reductions/minmax_reduction.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/axpy_partition_gpu.h
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/dummy_sched_with_ctx.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/gpu_partition.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/nested_sched_ctxs.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/parallel_code.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/parallel_tasks_reuse_handle.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/parallel_tasks_with_cluster_api.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/prio.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx_delete.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx_empty.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx_without_sched_policy.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx_without_sched_policy_awake.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx/two_cpu_contexts.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx_utils/sched_ctx_utils.c
Examining data/starpu-1.3.7+dfsg/examples/sched_ctx_utils/sched_ctx_utils.h
Examining data/starpu-1.3.7+dfsg/examples/scheduler/dummy_modular_sched.c
Examining data/starpu-1.3.7+dfsg/examples/scheduler/dummy_sched.c
Examining data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c
Examining data/starpu-1.3.7+dfsg/examples/spmd/vector_scal_spmd.c
Examining data/starpu-1.3.7+dfsg/examples/spmv/dw_block_spmv.c
Examining data/starpu-1.3.7+dfsg/examples/spmv/dw_block_spmv.h
Examining data/starpu-1.3.7+dfsg/examples/spmv/dw_block_spmv_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mm_to_bcsr.c
Examining data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mm_to_bcsr.h
Examining data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c
Examining data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.h
Examining data/starpu-1.3.7+dfsg/examples/spmv/spmv.c
Examining data/starpu-1.3.7+dfsg/examples/spmv/spmv.h
Examining data/starpu-1.3.7+dfsg/examples/spmv/spmv_kernels.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-blocks.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-kernels.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-tasks.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.h
Examining data/starpu-1.3.7+dfsg/examples/stencil/life.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/life_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/shadow.h
Examining data/starpu-1.3.7+dfsg/examples/stencil/shadow_opencl.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/stencil-blocks.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/stencil-kernels.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/stencil-tasks.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/stencil.c
Examining data/starpu-1.3.7+dfsg/examples/stencil/stencil.h
Examining data/starpu-1.3.7+dfsg/examples/tag_example/tag_example.c
Examining data/starpu-1.3.7+dfsg/examples/tag_example/tag_example2.c
Examining data/starpu-1.3.7+dfsg/examples/tag_example/tag_example3.c
Examining data/starpu-1.3.7+dfsg/examples/tag_example/tag_example4.c
Examining data/starpu-1.3.7+dfsg/examples/tag_example/tag_restartable.c
Examining data/starpu-1.3.7+dfsg/examples/worker_collections/worker_list_example.c
Examining data/starpu-1.3.7+dfsg/examples/worker_collections/worker_tree_example.c
Examining data/starpu-1.3.7+dfsg/include/pthread_win32/pthread.h
Examining data/starpu-1.3.7+dfsg/include/pthread_win32/semaphore.h
Examining data/starpu-1.3.7+dfsg/include/schedulers/starpu_heteroprio.h
Examining data/starpu-1.3.7+dfsg/include/starpu.h
Examining data/starpu-1.3.7+dfsg/include/starpu_bitmap.h
Examining data/starpu-1.3.7+dfsg/include/starpu_bound.h
Examining data/starpu-1.3.7+dfsg/include/starpu_clusters.h
Examining data/starpu-1.3.7+dfsg/include/starpu_cublas.h
Examining data/starpu-1.3.7+dfsg/include/starpu_cublas_v2.h
Examining data/starpu-1.3.7+dfsg/include/starpu_cuda.h
Examining data/starpu-1.3.7+dfsg/include/starpu_cusparse.h
Examining data/starpu-1.3.7+dfsg/include/starpu_data.h
Examining data/starpu-1.3.7+dfsg/include/starpu_data_filters.h
Examining data/starpu-1.3.7+dfsg/include/starpu_data_interfaces.h
Examining data/starpu-1.3.7+dfsg/include/starpu_deprecated_api.h
Examining data/starpu-1.3.7+dfsg/include/starpu_disk.h
Examining data/starpu-1.3.7+dfsg/include/starpu_driver.h
Examining data/starpu-1.3.7+dfsg/include/starpu_expert.h
Examining data/starpu-1.3.7+dfsg/include/starpu_fxt.h
Examining data/starpu-1.3.7+dfsg/include/starpu_hash.h
Examining data/starpu-1.3.7+dfsg/include/starpu_helper.h
Examining data/starpu-1.3.7+dfsg/include/starpu_mic.h
Examining data/starpu-1.3.7+dfsg/include/starpu_mpi_ms.h
Examining data/starpu-1.3.7+dfsg/include/starpu_opencl.h
Examining data/starpu-1.3.7+dfsg/include/starpu_openmp.h
Examining data/starpu-1.3.7+dfsg/include/starpu_perfmodel.h
Examining data/starpu-1.3.7+dfsg/include/starpu_profiling.h
Examining data/starpu-1.3.7+dfsg/include/starpu_rand.h
Examining data/starpu-1.3.7+dfsg/include/starpu_sched_component.h
Examining data/starpu-1.3.7+dfsg/include/starpu_sched_ctx.h
Examining data/starpu-1.3.7+dfsg/include/starpu_sched_ctx_hypervisor.h
Examining data/starpu-1.3.7+dfsg/include/starpu_scheduler.h
Examining data/starpu-1.3.7+dfsg/include/starpu_simgrid_wrap.h
Examining data/starpu-1.3.7+dfsg/include/starpu_sink.h
Examining data/starpu-1.3.7+dfsg/include/starpu_stdlib.h
Examining data/starpu-1.3.7+dfsg/include/starpu_task.h
Examining data/starpu-1.3.7+dfsg/include/starpu_task_bundle.h
Examining data/starpu-1.3.7+dfsg/include/starpu_task_dep.h
Examining data/starpu-1.3.7+dfsg/include/starpu_task_list.h
Examining data/starpu-1.3.7+dfsg/include/starpu_task_util.h
Examining data/starpu-1.3.7+dfsg/include/starpu_thread.h
Examining data/starpu-1.3.7+dfsg/include/starpu_thread_util.h
Examining data/starpu-1.3.7+dfsg/include/starpu_tree.h
Examining data/starpu-1.3.7+dfsg/include/starpu_util.h
Examining data/starpu-1.3.7+dfsg/include/starpu_worker.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/blaswrap.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/clapack.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/d_lg10.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/d_sign.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dcopy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dgelq2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dgelqf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dgels.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dgemm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dgemv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dgeqr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dgeqrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dger.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/disnan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlabad.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlaisnan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlamch.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlange.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlapy2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlarf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlarfb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlarfg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlarfp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlarft.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlascl.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlaset.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dlassq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dnrm2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dorm2r.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dorml2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dormlq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dormqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dscal.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dtrmm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dtrmv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dtrsm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/dtrtrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/f2c.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/fio.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/fmt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/fmt.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/ieeeck.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/iladlc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/iladlr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/ilaenv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/iparmq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/lsame.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/mindgels.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/pow_di.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/s_cat.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/sysdep1.h
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/wsfe.c
Examining data/starpu-1.3.7+dfsg/min-dgels/additional/xerbla.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dasum.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/daxpy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dcabs1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dcopy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/ddot.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dgbmv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dgemm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dgemv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dger.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dnrm2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/drot.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/drotg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/drotm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/drotmg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsbmv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dscal.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsdot.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dspmv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dspr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dspr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dswap.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsymm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsymv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsyr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsyr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsyr2k.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dsyrk.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtbmv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtbsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtpmv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtpsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtrmm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtrmv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtrsm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dtrsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dzasum.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/dznrm2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/idamax.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/izamax.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/lsame.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/xerbla.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/xerbla_array.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/WRAP/cblas.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/WRAP/cblaswr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/WRAP/fblaswr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/WRAP/fblaswr.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/abort_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/arithchk.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/backspac.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/c_abs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/c_cos.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/c_div.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/c_exp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/c_log.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/c_sin.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/c_sqrt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/cabs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/close.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ctype.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ctype.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_abs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_acos.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_asin.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_atan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_atn2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_cnjg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_cos.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_cosh.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_dim.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_exp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_imag.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_int.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_lg10.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_log.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_mod.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_nint.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_prod.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_sign.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_sin.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_sinh.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_sqrt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_tan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/d_tanh.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/derf_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/derfc_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/dfe.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/dolio.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/dtime_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/due.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ef1asc_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ef1cmc_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/endfile.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/erf_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/erfc_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/err.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/etime_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/exit_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/f2c.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/f77_aloc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/f77vers.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/fio.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/fmt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/fmt.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/fmtlib.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/fp.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ftell64_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ftell_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/getarg_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/getenv_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_abs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_dim.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_dnnt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_indx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_len.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_mod.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_nint.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/h_sign.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/hl_ge.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/hl_gt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/hl_le.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/hl_lt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i77vers.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_abs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_ceiling.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_dim.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_dnnt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_indx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_len.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_len_trim.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_mod.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_nint.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/i_sign.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/iargc_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/iio.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ilnw.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/inquire.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/l_ge.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/l_gt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/l_le.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/l_lt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lbitbits.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lbitshft.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lio.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lread.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lwrite.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/main.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_ci.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_dd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_di.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_hh.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_ii.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_qq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_ri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_zi.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/pow_zz.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/qbitbits.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/qbitshft.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_abs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_acos.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_asin.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_atan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_atn2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_cnjg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_cos.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_cosh.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_dim.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_exp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_imag.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_int.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_lg10.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_log.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_mod.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_nint.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_sign.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_sin.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_sinh.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_sqrt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_tan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/r_tanh.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rawio.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rdfmt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rewind.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rsfe.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rsli.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rsne.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_cat.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_cmp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_copy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_paus.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_rnge.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_stop.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/sfe.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/sig_die.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/signal_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/signbit.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/sue.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/system_.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/typesize.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/uio.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/uninit.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/util.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wrtfmt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wsfe.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wsle.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wsne.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/xwsne.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/z_abs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/z_cos.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/z_div.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/z_exp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/z_log.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/z_sin.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/z_sqrt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/INCLUDE/blaswrap.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/INCLUDE/clapack.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/INCLUDE/f2c.h
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/VARIANTS/cholesky/RL/dpotrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/VARIANTS/cholesky/TOP/dpotrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/VARIANTS/lu/CR/dgetrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/VARIANTS/lu/LL/dgetrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/VARIANTS/lu/REC/dgetrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/VARIANTS/qr/LL/dgeqrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/VARIANTS/qr/LL/sceil.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/chla_transtype.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dbdsdc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dbdsqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ddisna.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbbrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbequ.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbequb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbrfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbrfsx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbsvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbsvxx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbtf2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbtrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbtrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgebak.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgebal.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgebd2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgebrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgecon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeequ.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeequb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgees.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeesx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeev.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeevx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgegs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgegv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgehd2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgehrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgejsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgelq2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgelqf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgels.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgelsd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgelss.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgelsx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgelsy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeql2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeqlf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeqp3.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeqpf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeqr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeqrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgerfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgerfsx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgerq2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgerqf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesc2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesdd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesvd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesvj.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesvxx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgetc2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgetf2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgetrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgetri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgetrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggbak.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggbal.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgges.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggesx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggev.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggevx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggglm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgghrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgglse.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggqrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggrqf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggsvd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggsvp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgsvj0.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgsvj1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtrfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtsvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgttrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgttrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtts2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhgeqz.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhsein.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhseqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/disnan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gbamv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gbrcond.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gbrfsx_extended.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gbrpvgrw.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_geamv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gercond.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gerfsx_extended.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_lin_berr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_porcond.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_porfsx_extended.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_porpvgrw.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_rpvgrw.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_syamv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_syrcond.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_syrfsx_extended.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_syrpvgrw.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_wwaddw.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlabad.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlabrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlacn2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlacon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlacpy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dladiv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlae2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaebz.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed0.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed3.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed4.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed5.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed6.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed7.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed8.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaed9.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaeda.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaein.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaev2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaexc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlag2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlag2s.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlags2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlagtf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlagtm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlagts.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlagv2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlahqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlahr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlahrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaic1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaisnan.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaln2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlals0.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlalsa.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlalsd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlamrg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaneg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlangb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlange.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlangt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlanhs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlansb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlansf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlansp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlanst.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlansy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlantb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlantp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlantr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlanv2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlapll.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlapmt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlapy2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlapy3.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqgb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqge.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqp2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqps.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr0.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr3.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr4.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr5.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqsb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqsp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqsy.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqtr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlar1v.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlar2v.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarfb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarfg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarfp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarft.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarfx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlargv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarnv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarra.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarre.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrj.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrk.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarrv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarscl2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlartg.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlartv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaruv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarz.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarzb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarzt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlas2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlascl.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlascl2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd0.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd3.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd4.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd5.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd6.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd7.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasd8.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasda.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasdq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasdt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaset.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasq1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasq2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasq3.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasq4.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasq5.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasq6.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasrt.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlassq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasv2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaswp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasy2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlasyf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlat2s.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlatbs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlatdf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlatps.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlatrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlatrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlatrz.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlatzm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlauu2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlauum.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dopgtr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dopmtr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorg2l.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorg2r.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorgbr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorghr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorgl2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorglq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorgql.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorgqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorgr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorgrq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorgtr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorm2l.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorm2r.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormbr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormhr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dorml2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormlq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormql.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormr2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormr3.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormrq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormrz.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormtr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbequ.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbrfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbstf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbsvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbtf2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbtrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbtrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpftrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpftri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpftrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpocon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpoequ.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpoequb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dporfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dporfsx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dposv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dposvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dposvxx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpotf2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpotrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpotri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpotrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dppcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dppequ.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpprfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dppsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dppsvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpptrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpptri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpptrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpstf2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpstrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dptcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpteqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dptrfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dptsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dptsvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpttrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpttrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dptts2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/drscl.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbev.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbevd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbevx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgst.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgvd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbtrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsfrk.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsgesv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspev.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspevd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspevx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspgst.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspgv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspgvd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspgvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsposv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsprfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspsv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspsvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsptrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsptrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsptri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsptrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstebz.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstedc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstegr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstein.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstemr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsteqr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsterf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstev.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstevd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstevr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstevx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsycon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyequb.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyev.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyevd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyevr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyevx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygs2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygst.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygvd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyrfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyrfsx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsysv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsysvx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsysvxx.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsytd2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsytf2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsytrd.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsytrf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsytri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsytrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtbcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtbrfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtbtrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtfsm.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtftri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtfttp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtfttr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgevc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgex2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgexc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgsen.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgsja.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgsna.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgsy2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtgsyl.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtpcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtprfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtptri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtptrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtpttf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtpttr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrcon.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrevc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrexc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrrfs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrsen.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrsna.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrsyl.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrti2.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrtri.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrtrs.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrttf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrttp.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtzrqf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtzrzf.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dzsum1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/icmax1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ieeeck.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaclc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaclr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/iladiag.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/iladlc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/iladlr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaenv.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaprec.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaslc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaslr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilatrans.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilauplo.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaver.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilazlc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilazlr.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/iparmq.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/izmax1.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/lsamen.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/maxloc.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/xerbla.c
Examining data/starpu-1.3.7+dfsg/min-dgels/base/SRC/xerbla_array.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/cache/cache.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/cache/cache_disable.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/comm/comm.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/comm/mix_comm.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/complex/mpi_complex.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/filters/filter.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/helper.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky_codelets.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky_codelets.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky_distributed.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky_kernels.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky_kernels.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky_models.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky_models.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_decomposition_matrix.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_decomposition_matrix.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_decomposition_params.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_decomposition_params.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/matrix_mult/mm.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/mpi_lu-double.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/mpi_lu-float.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pdlu.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pdlu_implicit.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pdlu_kernels.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_example.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_example_double.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_example_float.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_implicit_example.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_implicit_example_double.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_implicit_example_float.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_outofcore_example.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_outofcore_example_double.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_outofcore_example_float.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_solve.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_solve_double.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_solve_float.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pslu.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pslu_implicit.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pslu_kernels.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pxlu.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pxlu.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pxlu_implicit.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pxlu_kernels.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/pxlu_kernels.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5_lb.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/my_interface.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/my_interface.h
Examining data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype2.c
Examining data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype_early.c
Examining data/starpu-1.3.7+dfsg/mpi/include/starpu_mpi.h
Examining data/starpu-1.3.7+dfsg/mpi/include/starpu_mpi_lb.h
Examining data/starpu-1.3.7+dfsg/mpi/src/load_balancer/load_balancer.c
Examining data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.c
Examining data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.h
Examining data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_balancer_policy.h
Examining data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_data_interface.c
Examining data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_data_interface.h
Examining data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_heat_propagation.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_comm.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_comm.h
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_driver.h
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_early_data.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_early_data.h
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_early_request.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_early_request.h
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_mpi.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_mpi_backend.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_mpi_backend.h
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_sync_data.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_sync_data.h
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_tag.c
Examining data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_tag.h
Examining data/starpu-1.3.7+dfsg/mpi/src/nmad/starpu_mpi_nmad.c
Examining data/starpu-1.3.7+dfsg/mpi/src/nmad/starpu_mpi_nmad_backend.c
Examining data/starpu-1.3.7+dfsg/mpi/src/nmad/starpu_mpi_nmad_backend.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_cache.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_cache.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_cache_stats.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_cache_stats.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_collective.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_coop_sends.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_datatype.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_datatype.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_fortran.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_fxt.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_helper.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_init.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_init.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_private.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_private.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_req.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_select_node.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_select_node.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_stats.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_stats.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_task_insert.c
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_task_insert.h
Examining data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_task_insert_fortran.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/attr.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/block_interface.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/block_interface_pinned.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/broadcast.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/callback.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/datatypes.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/display_bindings.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/driver.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/early_request.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/early_stuff.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/gather.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/gather2.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/helper.h
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_block.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_compute.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_count.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_dyn_handles.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_node_choice.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_owner.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_owner2.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_owner_data.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_recv_cache.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_sent_cache.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/insert_task_seq.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/load_balancer.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/matrix.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/matrix2.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_detached_tag.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_earlyrecv.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_earlyrecv2.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_earlyrecv2_sync.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_irecv.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_irecv_detached.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_isend.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_isend_detached.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_reduction.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_reduction_kernels.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_redux.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_scatter_gather.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/mpi_test.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/multiple_send.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/pingpong.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/policy_register.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/policy_register_many.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/policy_register_toomany.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/policy_selection.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/policy_selection2.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/policy_unregister.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/ring.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/ring_async.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/ring_async_implicit.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/ring_sync.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/ring_sync_detached.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/starpu_redefine.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/sync.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/tags_checking.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/temporary.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/user_defined_datatype.c
Examining data/starpu-1.3.7+dfsg/mpi/tests/user_defined_datatype_value.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/app_driven_test/app_driven_test.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/cholesky/cholesky.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/cholesky/cholesky_implicit.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/cholesky/cholesky_kernels.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/cholesky/cholesky_models.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/hierarchical_ctxs/resize_hierarchical_ctxs.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/lp_test/lp_resize_test.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/lp_test/lp_test.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/sched_ctx_utils/sched_ctx_utils.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/examples/sched_ctx_utils/sched_ctx_utils.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/include/sc_hypervisor.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/include/sc_hypervisor_config.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/include/sc_hypervisor_lp.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/include/sc_hypervisor_monitoring.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/include/sc_hypervisor_policy.h
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/app_driven_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/feft_lp_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/gflops_rate_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/hard_coded_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/idle_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/ispeed_lp_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/ispeed_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/perf_count_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/teft_lp_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/throughput_lp_policy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/dichotomy.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_tools.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/policy_tools.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/speed.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/task_pool.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_config.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c
Examining data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor_intern.h
Examining data/starpu-1.3.7+dfsg/socl/examples/basic/basic.c
Examining data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c
Examining data/starpu-1.3.7+dfsg/socl/examples/mansched/mansched.c
Examining data/starpu-1.3.7+dfsg/socl/examples/matmul/matmul.c
Examining data/starpu-1.3.7+dfsg/socl/examples/testmap/testmap.c
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl_d3d10.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl_d3d11.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl_dx9_media_sharing.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl_ext.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl_gl.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl_gl_ext.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/cl_platform.h
Examining data/starpu-1.3.7+dfsg/socl/src/CL/opencl.h
Examining data/starpu-1.3.7+dfsg/socl/src/cl_buildprogram.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createbuffer.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createcommandqueue.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createcontext.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createcontextfromtype.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createimage2d.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createimage3d.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createkernel.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createkernelsinprogram.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createprogramwithbinary.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createprogramwithsource.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_createsampler.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuebarrier.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuebarrierwithwaitlist.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuecopybuffer.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuecopybuffertoimage.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuecopyimage.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuecopyimagetobuffer.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuemapbuffer.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuemapimage.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuemarker.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuemarkerwithwaitlist.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuenativekernel.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuendrangekernel.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuereadbuffer.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuereadimage.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuetask.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueueunmapmemobject.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuewaitforevents.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuewritebuffer.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_enqueuewriteimage.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_finish.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_flush.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getcommandqueueinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getcontextinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getdeviceids.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getdeviceinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_geteventinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_geteventprofilinginfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getextensionfunctionaddress.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getimageinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getkernelinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getkernelworkgroupinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getmemobjectinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getplatformids.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getplatforminfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getprogrambuildinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getprograminfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getsamplerinfo.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_getsupportedimageformats.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_icdgetplatformidskhr.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_releasecommandqueue.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_releasecontext.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_releaseevent.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_releasekernel.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_releasememobject.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_releaseprogram.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_releasesampler.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_retaincommandqueue.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_retaincontext.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_retainevent.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_retainkernel.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_retainmemobject.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_retainprogram.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_retainsampler.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_setcommandqueueproperty.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_setkernelarg.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_unloadcompiler.c
Examining data/starpu-1.3.7+dfsg/socl/src/cl_waitforevents.c
Examining data/starpu-1.3.7+dfsg/socl/src/command.c
Examining data/starpu-1.3.7+dfsg/socl/src/command.h
Examining data/starpu-1.3.7+dfsg/socl/src/command_list.c
Examining data/starpu-1.3.7+dfsg/socl/src/command_list.h
Examining data/starpu-1.3.7+dfsg/socl/src/command_queue.c
Examining data/starpu-1.3.7+dfsg/socl/src/command_queue.h
Examining data/starpu-1.3.7+dfsg/socl/src/debug.c
Examining data/starpu-1.3.7+dfsg/socl/src/debug.h
Examining data/starpu-1.3.7+dfsg/socl/src/event.c
Examining data/starpu-1.3.7+dfsg/socl/src/event.h
Examining data/starpu-1.3.7+dfsg/socl/src/gc.c
Examining data/starpu-1.3.7+dfsg/socl/src/gc.h
Examining data/starpu-1.3.7+dfsg/socl/src/getinfo.h
Examining data/starpu-1.3.7+dfsg/socl/src/init.c
Examining data/starpu-1.3.7+dfsg/socl/src/init.h
Examining data/starpu-1.3.7+dfsg/socl/src/mem_objects.c
Examining data/starpu-1.3.7+dfsg/socl/src/mem_objects.h
Examining data/starpu-1.3.7+dfsg/socl/src/ocl_icd.h
Examining data/starpu-1.3.7+dfsg/socl/src/socl.c
Examining data/starpu-1.3.7+dfsg/socl/src/socl.h
Examining data/starpu-1.3.7+dfsg/socl/src/task.c
Examining data/starpu-1.3.7+dfsg/socl/src/task.h
Examining data/starpu-1.3.7+dfsg/socl/src/util.c
Examining data/starpu-1.3.7+dfsg/socl/src/util.h
Examining data/starpu-1.3.7+dfsg/src/common/barrier.c
Examining data/starpu-1.3.7+dfsg/src/common/barrier.h
Examining data/starpu-1.3.7+dfsg/src/common/barrier_counter.c
Examining data/starpu-1.3.7+dfsg/src/common/barrier_counter.h
Examining data/starpu-1.3.7+dfsg/src/common/bitmap.c
Examining data/starpu-1.3.7+dfsg/src/common/fxt.c
Examining data/starpu-1.3.7+dfsg/src/common/fxt.h
Examining data/starpu-1.3.7+dfsg/src/common/graph.c
Examining data/starpu-1.3.7+dfsg/src/common/graph.h
Examining data/starpu-1.3.7+dfsg/src/common/hash.c
Examining data/starpu-1.3.7+dfsg/src/common/inlines.c
Examining data/starpu-1.3.7+dfsg/src/common/list.h
Examining data/starpu-1.3.7+dfsg/src/common/prio_list.h
Examining data/starpu-1.3.7+dfsg/src/common/rbtree.c
Examining data/starpu-1.3.7+dfsg/src/common/rbtree.h
Examining data/starpu-1.3.7+dfsg/src/common/rbtree_i.h
Examining data/starpu-1.3.7+dfsg/src/common/rwlock.c
Examining data/starpu-1.3.7+dfsg/src/common/rwlock.h
Examining data/starpu-1.3.7+dfsg/src/common/starpu_spinlock.c
Examining data/starpu-1.3.7+dfsg/src/common/starpu_spinlock.h
Examining data/starpu-1.3.7+dfsg/src/common/thread.c
Examining data/starpu-1.3.7+dfsg/src/common/thread.h
Examining data/starpu-1.3.7+dfsg/src/common/timing.c
Examining data/starpu-1.3.7+dfsg/src/common/timing.h
Examining data/starpu-1.3.7+dfsg/src/common/uthash.h
Examining data/starpu-1.3.7+dfsg/src/common/utils.c
Examining data/starpu-1.3.7+dfsg/src/common/utils.h
Examining data/starpu-1.3.7+dfsg/src/core/combined_workers.c
Examining data/starpu-1.3.7+dfsg/src/core/combined_workers.h
Examining data/starpu-1.3.7+dfsg/src/core/debug.c
Examining data/starpu-1.3.7+dfsg/src/core/debug.h
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/cg.c
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/cg.h
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/data_arbiter_concurrency.c
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/data_concurrency.c
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/data_concurrency.h
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/dependencies.c
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/implicit_data_deps.c
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/implicit_data_deps.h
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/tags.c
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/tags.h
Examining data/starpu-1.3.7+dfsg/src/core/dependencies/task_deps.c
Examining data/starpu-1.3.7+dfsg/src/core/detect_combined_workers.c
Examining data/starpu-1.3.7+dfsg/src/core/detect_combined_workers.h
Examining data/starpu-1.3.7+dfsg/src/core/disk.c
Examining data/starpu-1.3.7+dfsg/src/core/disk.h
Examining data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_hdf5.c
Examining data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_leveldb.cpp
Examining data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c
Examining data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_unistd.c
Examining data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_unistd_o_direct.c
Examining data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c
Examining data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.h
Examining data/starpu-1.3.7+dfsg/src/core/drivers.c
Examining data/starpu-1.3.7+dfsg/src/core/drivers.h
Examining data/starpu-1.3.7+dfsg/src/core/errorcheck.c
Examining data/starpu-1.3.7+dfsg/src/core/errorcheck.h
Examining data/starpu-1.3.7+dfsg/src/core/idle_hook.c
Examining data/starpu-1.3.7+dfsg/src/core/idle_hook.h
Examining data/starpu-1.3.7+dfsg/src/core/jobs.c
Examining data/starpu-1.3.7+dfsg/src/core/jobs.h
Examining data/starpu-1.3.7+dfsg/src/core/parallel_task.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.h
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel.h
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_print.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/regression.c
Examining data/starpu-1.3.7+dfsg/src/core/perfmodel/regression.h
Examining data/starpu-1.3.7+dfsg/src/core/progress_hook.c
Examining data/starpu-1.3.7+dfsg/src/core/progress_hook.h
Examining data/starpu-1.3.7+dfsg/src/core/sched_ctx.c
Examining data/starpu-1.3.7+dfsg/src/core/sched_ctx.h
Examining data/starpu-1.3.7+dfsg/src/core/sched_ctx_list.c
Examining data/starpu-1.3.7+dfsg/src/core/sched_ctx_list.h
Examining data/starpu-1.3.7+dfsg/src/core/sched_policy.c
Examining data/starpu-1.3.7+dfsg/src/core/sched_policy.h
Examining data/starpu-1.3.7+dfsg/src/core/simgrid.c
Examining data/starpu-1.3.7+dfsg/src/core/simgrid.h
Examining data/starpu-1.3.7+dfsg/src/core/simgrid_cpp.cpp
Examining data/starpu-1.3.7+dfsg/src/core/task.c
Examining data/starpu-1.3.7+dfsg/src/core/task.h
Examining data/starpu-1.3.7+dfsg/src/core/task_bundle.c
Examining data/starpu-1.3.7+dfsg/src/core/task_bundle.h
Examining data/starpu-1.3.7+dfsg/src/core/topology.c
Examining data/starpu-1.3.7+dfsg/src/core/topology.h
Examining data/starpu-1.3.7+dfsg/src/core/tree.c
Examining data/starpu-1.3.7+dfsg/src/core/workers.c
Examining data/starpu-1.3.7+dfsg/src/core/workers.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/coherency.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/coherency.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/copy_driver.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/copy_driver.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/data_request.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/data_request.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/datastats.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/datastats.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/datawizard.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/datawizard.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/filters.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/filters.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/footprint.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/footprint.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_filters.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_filters.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/coo_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_filters.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/data_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/data_interface.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/matrix_filters.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/matrix_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/multiformat_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/variable_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/vector_filters.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/vector_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/interfaces/void_interface.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/malloc.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/malloc.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/memalloc.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/memory_manager.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/memory_manager.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/memory_nodes.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/memory_nodes.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/memstats.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/memstats.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/node_ops.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/node_ops.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/reduction.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/sort_data_handles.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/sort_data_handles.h
Examining data/starpu-1.3.7+dfsg/src/datawizard/user_interactions.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/write_back.c
Examining data/starpu-1.3.7+dfsg/src/datawizard/write_back.h
Examining data/starpu-1.3.7+dfsg/src/debug/latency.c
Examining data/starpu-1.3.7+dfsg/src/debug/starpu_debug_helpers.h
Examining data/starpu-1.3.7+dfsg/src/debug/structures_size.c
Examining data/starpu-1.3.7+dfsg/src/debug/traces/anim.c
Examining data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c
Examining data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.h
Examining data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt_dag.c
Examining data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt_mpi.c
Examining data/starpu-1.3.7+dfsg/src/debug/traces/starpu_paje.c
Examining data/starpu-1.3.7+dfsg/src/dolib.c
Examining data/starpu-1.3.7+dfsg/src/drivers/cpu/driver_cpu.c
Examining data/starpu-1.3.7+dfsg/src/drivers/cpu/driver_cpu.h
Examining data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.c
Examining data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.h
Examining data/starpu-1.3.7+dfsg/src/drivers/cuda/starpu_cublas.c
Examining data/starpu-1.3.7+dfsg/src/drivers/cuda/starpu_cusparse.c
Examining data/starpu-1.3.7+dfsg/src/drivers/disk/driver_disk.c
Examining data/starpu-1.3.7+dfsg/src/drivers/disk/driver_disk.h
Examining data/starpu-1.3.7+dfsg/src/drivers/driver_common/driver_common.c
Examining data/starpu-1.3.7+dfsg/src/drivers/driver_common/driver_common.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_common.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_common.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_sink.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_sink.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_source.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_source.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_utils.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mp_common/mp_common.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mp_common/mp_common.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mp_common/sink_common.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mp_common/sink_common.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_common.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_common.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_sink.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_sink.h
Examining data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_source.c
Examining data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_source.h
Examining data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl.c
Examining data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl.h
Examining data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c
Examining data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.h
Examining data/starpu-1.3.7+dfsg/src/profiling/bound.c
Examining data/starpu-1.3.7+dfsg/src/profiling/bound.h
Examining data/starpu-1.3.7+dfsg/src/profiling/profiling.c
Examining data/starpu-1.3.7+dfsg/src/profiling/profiling.h
Examining data/starpu-1.3.7+dfsg/src/profiling/profiling_helpers.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_best_implementation.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_composed.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_eager.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_eager_calibration.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_eager_prio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_fifo.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_heft.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_heteroprio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_mct.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_perfmodel_select.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_prio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_random.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_sched.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_stage.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_userchoice.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_work_stealing.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/component_worker.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/deque_modeling_policy_data_aware.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/eager_central_policy.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/eager_central_priority_policy.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/fifo_queues.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/fifo_queues.h
Examining data/starpu-1.3.7+dfsg/src/sched_policies/graph_test_policy.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/helper_mct.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/helper_mct.h
Examining data/starpu-1.3.7+dfsg/src/sched_policies/heteroprio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/hierarchical_heft.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_eager.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_eager_prefetching.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_eager_prio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_ez.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_gemm.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_heft.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_heft2.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_heft_prio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_heteroprio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_heteroprio_heft.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_parallel_heft.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_parallel_random.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_prio.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_prio_prefetching.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_random.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_random_prefetching.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/modular_ws.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/parallel_eager.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/parallel_heft.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/prio_deque.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/prio_deque.h
Examining data/starpu-1.3.7+dfsg/src/sched_policies/random_policy.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/sched_component.h
Examining data/starpu-1.3.7+dfsg/src/sched_policies/scheduler_maker.c
Examining data/starpu-1.3.7+dfsg/src/sched_policies/work_stealing_policy.c
Examining data/starpu-1.3.7+dfsg/src/starpu_parameters.h
Examining data/starpu-1.3.7+dfsg/src/util/execute_on_all.c
Examining data/starpu-1.3.7+dfsg/src/util/file.c
Examining data/starpu-1.3.7+dfsg/src/util/fstarpu.c
Examining data/starpu-1.3.7+dfsg/src/util/misc.c
Examining data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support.c
Examining data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support.h
Examining data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support_environment.c
Examining data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support_omp_api.c
Examining data/starpu-1.3.7+dfsg/src/util/starpu_clusters_create.c
Examining data/starpu-1.3.7+dfsg/src/util/starpu_clusters_create.h
Examining data/starpu-1.3.7+dfsg/src/util/starpu_create_sync_task.c
Examining data/starpu-1.3.7+dfsg/src/util/starpu_data_cpy.c
Examining data/starpu-1.3.7+dfsg/src/util/starpu_data_cpy.h
Examining data/starpu-1.3.7+dfsg/src/util/starpu_task_insert.c
Examining data/starpu-1.3.7+dfsg/src/util/starpu_task_insert_utils.c
Examining data/starpu-1.3.7+dfsg/src/util/starpu_task_insert_utils.h
Examining data/starpu-1.3.7+dfsg/src/worker_collection/worker_list.c
Examining data/starpu-1.3.7+dfsg/src/worker_collection/worker_tree.c
Examining data/starpu-1.3.7+dfsg/starpufft/include/starpufft.h
Examining data/starpu-1.3.7+dfsg/starpufft/src/cudax_kernels.h
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufft-double.h
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufft-float.h
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufft.c
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufft_common.c
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufftf.c
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufftx.c
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufftx1d.c
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufftx2d.c
Examining data/starpu-1.3.7+dfsg/starpufft/src/starpufftx3d.c
Examining data/starpu-1.3.7+dfsg/starpufft/tests/test.c
Examining data/starpu-1.3.7+dfsg/starpufft/tests/test_threads.c
Examining data/starpu-1.3.7+dfsg/starpufft/tests/testf.c
Examining data/starpu-1.3.7+dfsg/starpufft/tests/testf_threads.c
Examining data/starpu-1.3.7+dfsg/starpufft/tests/testx.c
Examining data/starpu-1.3.7+dfsg/starpufft/tests/testx_threads.c
Examining data/starpu-1.3.7+dfsg/starpurm/examples/01_init_exit.c
Examining data/starpu-1.3.7+dfsg/starpurm/examples/02_list_units.c
Examining data/starpu-1.3.7+dfsg/starpurm/examples/03_cpusets.c
Examining data/starpu-1.3.7+dfsg/starpurm/examples/04_drs_enable.c
Examining data/starpu-1.3.7+dfsg/starpurm/examples/05_vector_scale.c
Examining data/starpu-1.3.7+dfsg/starpurm/examples/06_spawn.c
Examining data/starpu-1.3.7+dfsg/starpurm/examples/07_async_spawn.c
Examining data/starpu-1.3.7+dfsg/starpurm/include/starpurm.h
Examining data/starpu-1.3.7+dfsg/starpurm/src/starpurm.c
Examining data/starpu-1.3.7+dfsg/starpurm/src/starpurm_dlb.c
Examining data/starpu-1.3.7+dfsg/starpurm/src/starpurm_private.h
Examining data/starpu-1.3.7+dfsg/tests/datawizard/acquire_cb.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/acquire_cb_insert.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/acquire_release.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/acquire_release2.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/acquire_release_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/acquire_try.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/allocate.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/bcsr.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/cache.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/commute.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/commute2.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/copy.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/critical_section_with_void_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/data_implicit_deps.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/data_invalidation.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/data_lookup.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/deps.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/dining_philosophers.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/double_parameter.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/dsm_stress.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/gpu_ptr_register.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/gpu_register.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/handle_to_pointer.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/in_place_partition.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/increment_init.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/increment_redux.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/increment_redux_lazy.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/increment_redux_v2.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/bcsr/bcsr_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/bcsr/bcsr_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/block/block_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/block/block_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/coo/coo_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/coo/coo_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/copy_interfaces.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/csr/csr_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/csr/csr_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/matrix/matrix_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/matrix/matrix_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/advanced/generic.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/advanced/generic.h
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/advanced/multiformat_cuda_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/advanced/multiformat_data_release.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/advanced/multiformat_handle_conversion.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/advanced/multiformat_worker.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/advanced/same_handle.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/multiformat_conversion_codelets.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/multiformat_conversion_codelets_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/multiformat_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/multiformat_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/multiformat/multiformat_types.h
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/test_interfaces.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/test_interfaces.h
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/variable/variable_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/variable/variable_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/vector/vector_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/vector/vector_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/void/void_interface.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/invalidate_pending_requests.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/lazy_allocation.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/lazy_unregister.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/locality.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/manual_reduction.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/mpi_like.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/mpi_like.h
Examining data/starpu-1.3.7+dfsg/tests/datawizard/mpi_like_async.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/no_unregister.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/noreclaim.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/nowhere.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/numa_overflow.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/opencl_codelet_unsigned_inc.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/partition_dep.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/partition_init.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/partition_lazy.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/readers_and_writers.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/readonly.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/reclaim.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/redux_acquire.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/scal.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/scal.h
Examining data/starpu-1.3.7+dfsg/tests/datawizard/scratch.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/scratch_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/scratch_reuse.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/simgrid-locality.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/specific_node.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/sync_and_notify_data.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/sync_and_notify_data_implicit.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/sync_and_notify_data_opencl.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/sync_with_data_with_mem.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/sync_with_data_with_mem_non_blocking.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/sync_with_data_with_mem_non_blocking_implicit.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/task_with_multiple_time_the_same_handle.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/temporary_partition.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/temporary_partition_implicit.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/test_arbiter.cpp
Examining data/starpu-1.3.7+dfsg/tests/datawizard/unpartition.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/user_interaction_implicit.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/variable_parameters.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/variable_size.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/write_only_tmp_buffer.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/wt_broadcast.c
Examining data/starpu-1.3.7+dfsg/tests/datawizard/wt_host.c
Examining data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c
Examining data/starpu-1.3.7+dfsg/tests/disk/disk_copy.c
Examining data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c
Examining data/starpu-1.3.7+dfsg/tests/disk/disk_copy_unpack.c
Examining data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c
Examining data/starpu-1.3.7+dfsg/tests/disk/mem_reclaim.c
Examining data/starpu-1.3.7+dfsg/tests/errorcheck/invalid_blocking_calls.c
Examining data/starpu-1.3.7+dfsg/tests/errorcheck/invalid_tasks.c
Examining data/starpu-1.3.7+dfsg/tests/errorcheck/starpu_init_noworker.c
Examining data/starpu-1.3.7+dfsg/tests/errorcheck/workers_cpuid.c
Examining data/starpu-1.3.7+dfsg/tests/helper.h
Examining data/starpu-1.3.7+dfsg/tests/helper/cublas_init.c
Examining data/starpu-1.3.7+dfsg/tests/helper/cusparse_init.c
Examining data/starpu-1.3.7+dfsg/tests/helper/execute_on_all.c
Examining data/starpu-1.3.7+dfsg/tests/helper/pinned_memory.c
Examining data/starpu-1.3.7+dfsg/tests/helper/starpu_create_sync_task.c
Examining data/starpu-1.3.7+dfsg/tests/helper/starpu_data_cpy.c
Examining data/starpu-1.3.7+dfsg/tests/loader.c
Examining data/starpu-1.3.7+dfsg/tests/main/bind.c
Examining data/starpu-1.3.7+dfsg/tests/main/codelet_null_callback.c
Examining data/starpu-1.3.7+dfsg/tests/main/declare_deps_after_submission.c
Examining data/starpu-1.3.7+dfsg/tests/main/declare_deps_after_submission_synchronous.c
Examining data/starpu-1.3.7+dfsg/tests/main/declare_deps_in_callback.c
Examining data/starpu-1.3.7+dfsg/tests/main/deploop.c
Examining data/starpu-1.3.7+dfsg/tests/main/deprecated_func.c
Examining data/starpu-1.3.7+dfsg/tests/main/display_binding.c
Examining data/starpu-1.3.7+dfsg/tests/main/driver_api/init_run_deinit.c
Examining data/starpu-1.3.7+dfsg/tests/main/driver_api/run_driver.c
Examining data/starpu-1.3.7+dfsg/tests/main/empty_task.c
Examining data/starpu-1.3.7+dfsg/tests/main/empty_task_chain.c
Examining data/starpu-1.3.7+dfsg/tests/main/empty_task_sync_point.c
Examining data/starpu-1.3.7+dfsg/tests/main/empty_task_sync_point_tasks.c
Examining data/starpu-1.3.7+dfsg/tests/main/execute_on_a_specific_worker.c
Examining data/starpu-1.3.7+dfsg/tests/main/execute_schedule.c
Examining data/starpu-1.3.7+dfsg/tests/main/get_children_tasks.c
Examining data/starpu-1.3.7+dfsg/tests/main/get_current_task.c
Examining data/starpu-1.3.7+dfsg/tests/main/hwloc_cpuset.c
Examining data/starpu-1.3.7+dfsg/tests/main/increment_codelet.c
Examining data/starpu-1.3.7+dfsg/tests/main/increment_codelet.h
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task.c
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task_array.c
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task_dyn_handles.c
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task_many.c
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task_nullcodelet.c
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task_pack.c
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task_value.c
Examining data/starpu-1.3.7+dfsg/tests/main/insert_task_where.c
Examining data/starpu-1.3.7+dfsg/tests/main/mkdtemp.c
Examining data/starpu-1.3.7+dfsg/tests/main/multithreaded.c
Examining data/starpu-1.3.7+dfsg/tests/main/multithreaded_init.c
Examining data/starpu-1.3.7+dfsg/tests/main/pack.c
Examining data/starpu-1.3.7+dfsg/tests/main/pause_resume.c
Examining data/starpu-1.3.7+dfsg/tests/main/regenerate.c
Examining data/starpu-1.3.7+dfsg/tests/main/regenerate_pipeline.c
Examining data/starpu-1.3.7+dfsg/tests/main/restart.c
Examining data/starpu-1.3.7+dfsg/tests/main/starpu_init.c
Examining data/starpu-1.3.7+dfsg/tests/main/starpu_task_bundle.c
Examining data/starpu-1.3.7+dfsg/tests/main/starpu_task_wait.c
Examining data/starpu-1.3.7+dfsg/tests/main/starpu_task_wait_for_all.c
Examining data/starpu-1.3.7+dfsg/tests/main/starpu_worker_exists.c
Examining data/starpu-1.3.7+dfsg/tests/main/static_restartable.c
Examining data/starpu-1.3.7+dfsg/tests/main/static_restartable_tag.c
Examining data/starpu-1.3.7+dfsg/tests/main/static_restartable_using_initializer.c
Examining data/starpu-1.3.7+dfsg/tests/main/subgraph_repeat.c
Examining data/starpu-1.3.7+dfsg/tests/main/subgraph_repeat_regenerate.c
Examining data/starpu-1.3.7+dfsg/tests/main/subgraph_repeat_regenerate_tag.c
Examining data/starpu-1.3.7+dfsg/tests/main/subgraph_repeat_regenerate_tag_cycle.c
Examining data/starpu-1.3.7+dfsg/tests/main/subgraph_repeat_tag.c
Examining data/starpu-1.3.7+dfsg/tests/main/submit.c
Examining data/starpu-1.3.7+dfsg/tests/main/tag_get_task.c
Examining data/starpu-1.3.7+dfsg/tests/main/tag_task_data_deps.c
Examining data/starpu-1.3.7+dfsg/tests/main/tag_wait_api.c
Examining data/starpu-1.3.7+dfsg/tests/main/task_end_dep.c
Examining data/starpu-1.3.7+dfsg/tests/main/task_wait_api.c
Examining data/starpu-1.3.7+dfsg/tests/main/wait_all_regenerable_tasks.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/display_structures_size.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/local_pingpong.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/matrix_as_vector.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/parallel_dependent_homogeneous_tasks_data.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/parallel_independent_heterogeneous_tasks.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/parallel_independent_heterogeneous_tasks_data.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/parallel_independent_homogeneous_tasks.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/parallel_independent_homogeneous_tasks_data.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/parallel_redux_heterogeneous_tasks_data.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/parallel_redux_homogeneous_tasks_data.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/prefetch_data_on_node.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/redundant_buffer.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c
Examining data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c
Examining data/starpu-1.3.7+dfsg/tests/model-checking/prio_list.c
Examining data/starpu-1.3.7+dfsg/tests/model-checking/starpu_barrier.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/api_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/array_slice_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/cuda_task_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/environment.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/init_exit_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/init_exit_02.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_02.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_03.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_barrier_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_critical_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_critical_inline_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_critical_named_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_critical_named_inline_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_for_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_for_02.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_for_ordered_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_master_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_master_inline_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_nested_lock_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_sections_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_sections_combined_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_simple_lock_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_single_copyprivate_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_single_copyprivate_inline_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_single_inline_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_single_nowait_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/parallel_single_wait_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/task_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/task_02.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/task_03.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/taskgroup_01.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/taskgroup_02.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/taskloop.c
Examining data/starpu-1.3.7+dfsg/tests/openmp/taskwait_01.c
Examining data/starpu-1.3.7+dfsg/tests/overlap/gpu_concurrency.c
Examining data/starpu-1.3.7+dfsg/tests/overlap/overlap.c
Examining data/starpu-1.3.7+dfsg/tests/parallel_tasks/cuda_only.c
Examining data/starpu-1.3.7+dfsg/tests/parallel_tasks/explicit_combined_worker.c
Examining data/starpu-1.3.7+dfsg/tests/parallel_tasks/parallel_kernels.c
Examining data/starpu-1.3.7+dfsg/tests/parallel_tasks/parallel_kernels_spmd.c
Examining data/starpu-1.3.7+dfsg/tests/parallel_tasks/parallel_kernels_trivial.c
Examining data/starpu-1.3.7+dfsg/tests/parallel_tasks/spmd_peager.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/feed.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/memory.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/non_linear_regression_based.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/opencl_memset.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/regression_based.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/user_base.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/valid_model.c
Examining data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c
Examining data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_hierarchy.c
Examining data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_list.c
Examining data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_policy_data.c
Examining data/starpu-1.3.7+dfsg/tests/sched_policies/data_locality.c
Examining data/starpu-1.3.7+dfsg/tests/sched_policies/execute_all_tasks.c
Examining data/starpu-1.3.7+dfsg/tests/sched_policies/prio.c
Examining data/starpu-1.3.7+dfsg/tests/sched_policies/simple_cpu_gpu_sched.c
Examining data/starpu-1.3.7+dfsg/tests/sched_policies/simple_deps.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_calibrate_bus.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_fxt_data_trace.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_fxt_stats.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_fxt_tool.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_lp2paje.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_machine_display.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_display.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_replay.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_sched_display.c
Examining data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c

FINAL RESULTS:

data/starpu-1.3.7+dfsg/tools/starpu_fxt_data_trace.c:154:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	ret = chmod(file_name, sb.st_mode|S_IXUSR);
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:533:10:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
			ret = chmod(gnuplot_file_name, sb.st_mode|S_IXUSR);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:47:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path_file_start, base);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:49:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_start, name_file_start);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:52:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path_file_end, base);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:54:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_end, name_file_end);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_copy.c:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/axpy/axpy.c:44:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/block.c:20:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/dynamic_handles.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/hello_world.c:33:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat.c:28:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat_conversion_codelets.c:20:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/task_insert_color.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/topology.c:21:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/variable.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/vector_scal.c:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/binary/binary.c:24:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/callback/callback.c:24:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/callback/prologue.c:26:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cg/cg.c:26:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky.h:36:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky.h:37:63:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cpp/incrementer_cpp.cpp:24:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/dependency/sequential_consistency.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/dependency/task_end_dep.c:22:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/dependency/task_end_dep_add.c:22:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_types.h:30:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fblock.c:29:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmatrix.c:28:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_manual.c:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit.c:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit_implicit.c:39:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit_readonly.c:40:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fplan_notautomatic.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fread.c:22:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/frecursive.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fvector.c:28:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/shadow.c:50:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/shadow2d.c:93:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/shadow3d.c:41:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/fortran/StarPU_fortran.h:1:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
C StarPU --- Runtime system for heterogeneous multicore architectures.
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.c:38:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug(fmt, ...) fprintf(stderr, fmt, ## __VA_ARGS__)
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.h:34:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.h:35:63:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/dw_sparse_cg.c:23:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/heat.h:37:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/heat.h:38:63:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/incrementer/incrementer.c:30:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/interface/complex_codelet.h:23:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/lu/lu_example.c:44:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/lu/xlu.h:34:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/lu/xlu.h:35:63:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/matvecmult/matvecmult.c:20:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/mult/xgemm.c:63:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/mult/xgemm.c:64:63:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/openmp/vector_scal_omp.c:39:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/pi/pi.c:35:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/pi/pi_redux.c:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/pipeline/pipeline.c:40:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/profiling/profiling.c:25:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/reductions/dot_product.c:33:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/reductions/minmax_reduction.c:35:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/dummy_sched_with_ctx.c:34:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/gpu_partition.c:35:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/prio.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx_empty.c:19:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/scheduler/dummy_modular_sched.c:34:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/scheduler/dummy_sched.c:33:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:25:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/spmd/vector_scal_spmd.c:36:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/spmv/dw_block_spmv.c:36:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:442:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return strcpy(s2, s);
data/starpu-1.3.7+dfsg/examples/spmv/spmv.h:28:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-kernels.c:88:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define DEBUG(fmt, ...) fprintf(stderr,fmt,##__VA_ARGS__)
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-tasks.c:32:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define DEBUG(fmt, ...) fprintf(stderr,fmt,##__VA_ARGS__)
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.h:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/stencil/stencil-kernels.c:88:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define DEBUG(fmt, ...) fprintf(stderr,fmt,##__VA_ARGS__)
data/starpu-1.3.7+dfsg/examples/stencil/stencil-tasks.c:32:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define DEBUG(fmt, ...) fprintf(stderr,fmt,##__VA_ARGS__)
data/starpu-1.3.7+dfsg/examples/stencil/stencil.h:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example.c:45:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example2.c:31:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example3.c:33:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example4.c:32:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_restartable.c:45:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/worker_collections/worker_list_example.c:22:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/worker_collections/worker_tree_example.c:23:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:34:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,										\
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:44:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,							\
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:54:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,							\
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:68:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:78:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:95:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:106:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:148:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:158:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:171:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:180:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:189:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:203:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:213:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:238:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:263:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:273:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:286:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:296:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:306:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:316:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:326:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:358:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:368:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/include/starpu_thread_util.h:378:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,                                                \
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/arithchk.c:126:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	if (printf(emptyfmt, Cray1) >= 0)
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/arithchk.c:128:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	if (printf(emptyfmt, Cray1) >= 0)
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/endfile.c:17:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char *strcpy();
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/err.c:143:36:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	Help! How does fstat work on this system?
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/err.c:167:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, f__curunit->ufnm ? "named %s\n" : "(unnamed)\n",
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/inquire.c:35:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		x = access(buf,0) ? -1 : 0;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lwrite.c:110:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buf, fmt, n);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lwrite.c:113:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	return sprintf(buf, fmt, n);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lwrite.c:137:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(b, LGFMT, n);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:15:14:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
extern char *mktemp();
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:207:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(buf,0))
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:216:10:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
		(void) mktemp(buf);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:237:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(buf,0))
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:252:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(b->ufnm,buf);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rawio.h:29:14:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
extern char *mktemp(char*);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/system_.c:35:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	rv = system(buff);
data/starpu-1.3.7+dfsg/mpi/examples/complex/mpi_complex.c:21:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/filters/filter.c:25:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/helper.h:30:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/helper.h:33:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                                fprintf(ofile, "[%d][starpu_mpi][%s] " fmt , _disp_rank, __starpu_func__ ,## __VA_ARGS__); \
data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky.h:28:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5.c:20:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5.c:23:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                                fprintf(ofile, "[%d][starpu_mpi][%s] " fmt , _disp_rank, __starpu_func__ ,## __VA_ARGS__); \
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5_lb.c:21:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5_lb.c:24:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                                fprintf(ofile, "[%d][starpu_mpi][%s] " fmt , _disp_rank, __starpu_func__ ,## __VA_ARGS__); \
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype.c:20:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype2.c:20:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype_early.c:20:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_private.h:129:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(stderr, "%*s[%d][starpu_mpi][%s:%d] " fmt , (_starpu_debug_rank+1)*4, "", _starpu_debug_rank, __starpu_func__ , __LINE__,## __VA_ARGS__); \
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_private.h:142:46:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                             fprintf(stderr, "%*s[%d][starpu_mpi][%s:%d] " fmt , (_starpu_debug_rank+1)*4, "", _starpu_debug_rank, __starpu_func__ , __LINE__ ,## __VA_ARGS__); \
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_private.h:145:46:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                             fprintf(stderr, "[%d][starpu_mpi][%s:%d] " fmt , _starpu_debug_rank, __starpu_func__ , __LINE__ ,## __VA_ARGS__); \
data/starpu-1.3.7+dfsg/mpi/tests/helper.h:22:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/tests/helper.h:25:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(ofile, "[%d][starpu_mpi][%s] " fmt , _disp_rank, __starpu_func__ ,## __VA_ARGS__); \
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/app_driven_test/app_driven_test.c:24:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/cholesky/cholesky.h:35:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/hierarchical_ctxs/resize_hierarchical_ctxs.c:24:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/lp_test/lp_resize_test.c:24:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/lp_test/lp_test.c:24:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/socl/examples/basic/basic.c:29:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define error(...) do { fprintf(stderr, "Error: " __VA_ARGS__); exit(EXIT_FAILURE); } while(0)
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:171:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(str, (unsigned int)val); \
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:178:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(str, val); \
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:185:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(str, val); \
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:192:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(str, val); \
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:199:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(str, (val == CL_TRUE ? "Yes" : "No")); \
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:206:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(str, (val == CL_TRUE ? t : f)); \
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:213:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(str, ((val & test) == CL_TRUE ? "Yes" : "No")); \
data/starpu-1.3.7+dfsg/socl/examples/mansched/mansched.c:29:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define error(...) do { fprintf(stderr, "Error: " __VA_ARGS__); exit(EXIT_FAILURE); } while(0)
data/starpu-1.3.7+dfsg/socl/examples/matmul/matmul.c:39:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define error(...) do { fprintf(stderr, "Error: " __VA_ARGS__); exit(EXIT_FAILURE); } while(0)
data/starpu-1.3.7+dfsg/socl/examples/testmap/testmap.c:29:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define error(...) do { fprintf(stderr, "Error: " __VA_ARGS__); exit(EXIT_FAILURE); } while(0)
data/starpu-1.3.7+dfsg/socl/src/debug.h:25:111:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_MSG(...) do { if (!getenv("STARPU_SILENT")) { fprintf(stderr, "[SOCL] [%s] ", __starpu_func__); fprintf(stderr, __VA_ARGS__);}} while (0)
data/starpu-1.3.7+dfsg/socl/src/debug.h:26:68:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_MSG_NOHEAD(...) do { if (!getenv("STARPU_SILENT")) { fprintf(stderr, __VA_ARGS__);}} while (0);
data/starpu-1.3.7+dfsg/socl/src/debug.h:27:63:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_ERROR(...) do { if (!getenv("STARPU_SILENT")) { fprintf(stderr, "[SOCL] ERROR: "__VA_ARGS__); } exit(1); } while (0)
data/starpu-1.3.7+dfsg/socl/src/debug.h:34:86:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ERROR_MSG(...) do { fprintf(stderr, "[SOCL] [%s] ERROR: ", __starpu_func__); fprintf(stderr, __VA_ARGS__); } while (0)
data/starpu-1.3.7+dfsg/socl/src/debug.h:35:31:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ERROR_MSG_NOHEAD(...) fprintf(stderr, __VA_ARGS__)
data/starpu-1.3.7+dfsg/socl/src/getinfo.h:35:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(param_value, var); \
data/starpu-1.3.7+dfsg/src/common/uthash.h:263:29:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define HASH_OOPS(...) do { fprintf(stderr,__VA_ARGS__); exit(-1); } while (0)
data/starpu-1.3.7+dfsg/src/common/utils.c:712:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int hwloc_ret = system("hwloc-ps -a -t -c");
data/starpu-1.3.7+dfsg/src/common/utils.h:96:62:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define _STARPU_DEBUG(fmt, ...) do { if (!_starpu_silent) {fprintf(stderr, STARPU_DEBUG_PREFIX"[%s] " fmt ,__starpu_func__ ,## __VA_ARGS__); fflush(stderr); }} while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:97:72:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define _STARPU_DEBUG_NO_HEADER(fmt, ...) do { if (!_starpu_silent) {fprintf(stderr, fmt , ## __VA_ARGS__); fflush(stderr); }} while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:104:68:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define _STARPU_EXTRA_DEBUG(fmt, ...) do { if (!_starpu_silent) {fprintf(stderr, STARPU_DEBUG_PREFIX"[%s] " fmt ,__starpu_func__ ,## __VA_ARGS__); fflush(stderr); }} while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:110:67:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define _STARPU_LOG_IN()             do { if (!_starpu_silent) {fprintf(stderr, STARPU_DEBUG_PREFIX"[%ld][%s:%s@%d] -->\n", starpu_pthread_self(), __starpu_func__,__FILE__,  __LINE__); }} while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:111:67:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define _STARPU_LOG_OUT()            do { if (!_starpu_silent) {fprintf(stderr, STARPU_DEBUG_PREFIX"[%ld][%s:%s@%d] <--\n", starpu_pthread_self(), __starpu_func__, __FILE__,  __LINE__); }} while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:112:67:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define _STARPU_LOG_OUT_TAG(outtag)  do { if (!_starpu_silent) {fprintf(stderr, STARPU_DEBUG_PREFIX"[%ld][%s:%s@%d] <-- (%s)\n", starpu_pthread_self(), __starpu_func__, __FILE__, __LINE__, outtag); }} while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:120:36:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define _STARPU_MSG(fmt, ...) do { fprintf(stderr, STARPU_DEBUG_PREFIX"[%s] " fmt ,__starpu_func__ ,## __VA_ARGS__); } while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:121:59:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define _STARPU_DISP(fmt, ...) do { if (!_starpu_silent) {fprintf(stderr, STARPU_DEBUG_PREFIX"[%s] " fmt ,__starpu_func__ ,## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/src/common/utils.h:124:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf(stderr, "\n\n[starpu][%s] Error: " fmt ,__starpu_func__ ,## __VA_ARGS__);    \
data/starpu-1.3.7+dfsg/src/core/debug.c:76:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(logfile, format, args);
data/starpu-1.3.7+dfsg/src/core/debug.h:300:80:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void _starpu_print_to_logfile(const char *format, ...) STARPU_ATTRIBUTE_FORMAT(printf, 1, 2);
data/starpu-1.3.7+dfsg/src/core/dependencies/implicit_data_deps.c:25:38:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define _STARPU_DEP_DEBUG(fmt, ...) fprintf(stderr, fmt, ## __VA_ARGS__);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1085:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	exist = access(path, F_OK);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1486:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	res = access(path, F_OK);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1941:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	res = access(path, F_OK);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2017:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	res = access(path, F_OK);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2938:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	res = access(path, F_OK);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2943:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		res = access(path, F_OK);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1460:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	res = access(path, F_OK);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:59:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf(f, format, val);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:62:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(f, format, val);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:96:10:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		return fscanf(f, format, val);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:99:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	return fscanf(f, format, val);
data/starpu-1.3.7+dfsg/src/core/simgrid.c:161:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(name, sizeof(name), STARPU_MPI_AS_PREFIX"%d", starpu_mpi_world_rank());
data/starpu-1.3.7+dfsg/src/core/simgrid.c:251:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(mpiname, sizeof(mpiname), STARPU_MPI_AS_PREFIX"%d-%s", starpu_mpi_world_rank(), name);
data/starpu-1.3.7+dfsg/src/core/simgrid.c:1230:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, sizeof(name), fmt, starpu_memory_node_get_devid(node));
data/starpu-1.3.7+dfsg/src/dolib.c:57:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (system(s))
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:774:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(located_file_name, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:788:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(env_file_name, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:797:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			return access(located_file_name, R_OK);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:802:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(config_file_name, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:811:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			return access(located_file_name, R_OK);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:831:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				if (access(tmp, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:53:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(source_file_name, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:65:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(*located_file_name, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:75:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(*located_file_name, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:85:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(*located_file_name, R_OK) == 0)
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:258:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(p, ".%s.vendor_id_%d_device_id_%d", _starpu_opencl_get_device_type_as_string(dev), (int)vendor_id, dev);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:402:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(located_file_name, "%s", _located_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:404:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(located_dir_name, "%s", _located_dir_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:406:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(opencl_program_source, "%s", source);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:56:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path_file_start, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:58:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_start, name_file_start);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:61:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path_file_end, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:63:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_end, name_file_end);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:429:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(hdf5_base, s);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:53:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path_file_start, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:55:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_start, name_dir_src);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:57:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_start, name_file_start);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:60:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(base_src, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:62:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(base_src, name_dir_src);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:65:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(base_dst, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:67:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(base_dst, name_dir_dst);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:197:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(hdf5_base_src, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:199:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(hdf5_base_src, name_hdf5_start);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:202:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(hdf5_base_dst, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:204:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(hdf5_base_dst, name_hdf5_end);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:87:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path_file_start, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:89:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_start, name_file_start);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:92:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path_file_end, base);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:94:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path_file_end, name_file_end);
data/starpu-1.3.7+dfsg/tests/helper.h:50:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/tests/loader.c:110:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(gdb, top_builddir);
data/starpu-1.3.7+dfsg/tests/loader.c:112:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			err = execl(gdb, "gdb", "--mode=execute",
data/starpu-1.3.7+dfsg/tests/loader.c:122:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			err = execl(gdb, "gdb", "--batch",
data/starpu-1.3.7+dfsg/tests/loader.c:200:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(new_src, value);
data/starpu-1.3.7+dfsg/tests/loader.c:201:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(new_src, found+strlen(motif));
data/starpu-1.3.7+dfsg/tests/loader.c:284:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(test_name, "%s/%s", argv[x+1], argv[x+2]);
data/starpu-1.3.7+dfsg/tests/loader.c:310:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(test_name, argv+x-1);
data/starpu-1.3.7+dfsg/tests/loader.c:348:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(libtool, top_builddir);
data/starpu-1.3.7+dfsg/tests/loader.c:410:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(*launcher_argv, launcher_argv);
data/starpu-1.3.7+dfsg/tests/main/task_end_dep.c:22:71:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/tests/model-checking/starpu_barrier.c:28:62:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define _STARPU_DEBUG(fmt, ...) do { if (!_starpu_silent) {fprintf(stderr, STARPU_DEBUG_PREFIX"[%s] " fmt ,__starpu_func__ ,## __VA_ARGS__); fflush(stderr); }} while(0)
data/starpu-1.3.7+dfsg/tests/openmp/api_01.c:67:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(#f ": %d (should be %d)\n", v, tv);		\
data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c:40:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(filename, tmp);
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:672:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						realmodel->model_name = strcpy(realmodel->model_name, model);
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:51:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug(fmt, ...) fprintf(stderr, fmt, ##__VA_ARGS__)
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_copy.c:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/axpy/axpy.c:44:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/block.c:20:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/dynamic_handles.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/hello_world.c:33:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat.c:28:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/multiformat_conversion_codelets.c:20:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/task_insert_color.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/topology.c:21:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/variable.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/basic_examples/vector_scal.c:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/binary/binary.c:24:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/callback/callback.c:24:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/callback/prologue.c:26:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cg/cg.c:26:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky.h:36:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky.h:37:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/cpp/incrementer_cpp.cpp:24:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/dependency/sequential_consistency.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/dependency/task_end_dep.c:22:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/dependency/task_end_dep_add.c:22:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/custom_mf/custom_types.h:30:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fblock.c:29:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmatrix.c:28:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_manual.c:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit.c:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit_implicit.c:39:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fmultiple_submit_readonly.c:40:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fplan_notautomatic.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fread.c:22:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/frecursive.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/fvector.c:28:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/shadow.c:50:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/shadow2d.c:93:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/filters/shadow3d.c:41:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.h:34:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.h:35:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/dw_sparse_cg.c:23:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/heat.c:806:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *display = getenv("DISPLAY");
data/starpu-1.3.7+dfsg/examples/heat/heat.h:37:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/heat/heat.h:38:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/incrementer/incrementer.c:30:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/interface/complex_codelet.h:23:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/lu/lu_example.c:44:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/lu/xlu.h:34:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/lu/xlu.h:35:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/matvecmult/matvecmult.c:20:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/mult/xgemm.c:63:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/mult/xgemm.c:64:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define PRINTF(fmt, ...) do { if (!getenv("STARPU_SSILENT")) {printf(fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/openmp/vector_scal_omp.c:39:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/pi/pi.c:35:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/pi/pi.c:212:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("STARPU_SSILENT")) starpu_codelet_display_stats(&pi_cl);
data/starpu-1.3.7+dfsg/examples/pi/pi_redux.c:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/pipeline/pipeline.c:40:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/profiling/profiling.c:25:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/reductions/dot_product.c:33:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/reductions/minmax_reduction.c:35:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/dummy_sched_with_ctx.c:34:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/gpu_partition.c:35:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/prio.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx.c:89:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/examples/sched_ctx/sched_ctx_empty.c:19:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/scheduler/dummy_modular_sched.c:34:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/scheduler/dummy_modular_sched.c:231:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/examples/scheduler/dummy_sched.c:33:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/scheduler/dummy_sched.c:159:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:25:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/spmd/vector_scal_spmd.c:36:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/spmv/dw_block_spmv.c:36:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/spmv/spmv.h:28:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.h:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/stencil/stencil.h:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example.c:45:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example2.c:31:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example3.c:33:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_example4.c:32:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/tag_example/tag_restartable.c:45:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/worker_collections/worker_list_example.c:22:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/examples/worker_collections/worker_tree_example.c:23:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/include/starpu_rand.h:42:31:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#  define starpu_drand48()				drand48()
data/starpu-1.3.7+dfsg/include/starpu_rand.h:43:31:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#  define starpu_lrand48()				lrand48()
data/starpu-1.3.7+dfsg/include/starpu_rand.h:44:36:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#  define starpu_erand48(xsubi)				erand48(xsubi)
data/starpu-1.3.7+dfsg/include/starpu_rand.h:54:63:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#    define starpu_drand48_r(buffer, result)		do {*(result) = drand48(); } while (0)
data/starpu-1.3.7+dfsg/include/starpu_rand.h:55:63:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#    define starpu_lrand48_r(buffer, result)		do {*(result) = lrand48(); } while (0)
data/starpu-1.3.7+dfsg/include/starpu_rand.h:56:84:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#    define starpu_erand48_r(xsubi, buffer, result)	do {(void) buffer; *(result) = erand48(xsubi); } while (0)
data/starpu-1.3.7+dfsg/include/starpu_rand.h:60:35:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#  define starpu_srand48(seed)				srand(starpu_seed(seed))
data/starpu-1.3.7+dfsg/include/starpu_rand.h:64:44:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#  define starpu_srand48_r(seed, buffer) 		srand(starpu_seed(seed))
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/getenv_.c:4:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char *F77_aloc(), *getenv();
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/getenv_.c:42:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			ep = getenv(buf);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/getenv_.c:50:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ep = getenv(fp);
data/starpu-1.3.7+dfsg/mpi/examples/complex/mpi_complex.c:21:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/filters/filter.c:25:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/helper.h:30:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/helper.h:31:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF_MPI(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) { \
data/starpu-1.3.7+dfsg/mpi/examples/matrix_decomposition/mpi_cholesky.h:28:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5.c:20:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5.c:21:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF_MPI(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) { \
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5_lb.c:21:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5_lb.c:22:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF_MPI(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) { \
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype.c:20:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype2.c:20:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype_early.c:20:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_mpi.c:1555:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(time(NULL));
data/starpu-1.3.7+dfsg/mpi/src/nmad/starpu_mpi_nmad.c:622:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(time(NULL));
data/starpu-1.3.7+dfsg/mpi/tests/helper.h:22:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/mpi/tests/helper.h:23:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF_MPI(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) { \
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/app_driven_test/app_driven_test.c:24:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/cholesky/cholesky.h:35:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/hierarchical_ctxs/resize_hierarchical_ctxs.c:24:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/lp_test/lp_resize_test.c:24:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/examples/lp_test/lp_test.c:24:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/speed.c:32:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *start_sample_prc_char = getenv("SC_HYPERVISOR_START_RESIZE");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/speed.c:41:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *speed_sample_criteria = getenv("SC_HYPERVISOR_SAMPLE_CRITERIA");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/speed.c:116:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *speed_sample_criteria = getenv("SC_HYPERVISOR_SAMPLE_CRITERIA");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:113:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char* policy_name = getenv("SC_HYPERVISOR_POLICY");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:145:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		policy_name = getenv("SC_HYPERVISOR_POLICY");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:169:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char* vel_gap = getenv("SC_HYPERVISOR_MAX_SPEED_GAP");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:171:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char* crit =  getenv("SC_HYPERVISOR_TRIGGER_RESIZE");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:265:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char* stop_print = getenv("SC_HYPERVISOR_STOP_PRINT");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:326:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *sched_env = getenv("OVERHEAD_FILE");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:1536:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char* lazy = getenv("SC_HYPERVISOR_LAZY_RESIZE");
data/starpu-1.3.7+dfsg/socl/examples/matmul/matmul.c:365:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(2008);
data/starpu-1.3.7+dfsg/socl/src/cl_createcommandqueue.c:59:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char * fd = getenv("SOCL_FORCE_DYNAMIC");
data/starpu-1.3.7+dfsg/socl/src/cl_createcontext.c:98:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char * sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/socl/src/debug.h:25:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define DEBUG_MSG(...) do { if (!getenv("STARPU_SILENT")) { fprintf(stderr, "[SOCL] [%s] ", __starpu_func__); fprintf(stderr, __VA_ARGS__);}} while (0)
data/starpu-1.3.7+dfsg/socl/src/debug.h:26:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define DEBUG_MSG_NOHEAD(...) do { if (!getenv("STARPU_SILENT")) { fprintf(stderr, __VA_ARGS__);}} while (0);
data/starpu-1.3.7+dfsg/socl/src/debug.h:27:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define DEBUG_ERROR(...) do { if (!getenv("STARPU_SILENT")) { fprintf(stderr, "[SOCL] ERROR: "__VA_ARGS__); } exit(1); } while (0)
data/starpu-1.3.7+dfsg/socl/src/init.c:140:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char * skip_str = getenv("SOCL_SKIP_DESTRUCTOR");
data/starpu-1.3.7+dfsg/src/common/utils.c:588:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return getenv(str);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_hdf5.c:910:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_leveldb.cpp:277:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time (NULL));
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c:364:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:748:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/starpu-1.3.7+dfsg/src/core/simgrid.h:58:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define _starpu_simgrid_running_smpi() (getenv("SMPI_GLOBAL_SIZE") != NULL)
data/starpu-1.3.7+dfsg/src/sched_policies/component_random.c:81:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		if(alpha + speedup[i] >= random)
data/starpu-1.3.7+dfsg/src/sched_policies/random_policy.c:74:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		if (alpha + worker_alpha >= random)
data/starpu-1.3.7+dfsg/starpufft/tests/testx_threads.c:48:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	num = getenv("NUM_THREADS");
data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/copy_interfaces.c:29:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("STARPU_SSILENT") && new_handle->ops->display)
data/starpu-1.3.7+dfsg/tests/datawizard/variable_size.c:289:50:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	snprintf(s, sizeof(s), "/tmp/%s-variable_size", getenv("USER"));
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:407:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	snprintf(s, sizeof(s), "/tmp/%s-disk-XXXXXX", getenv("USER"));
data/starpu-1.3.7+dfsg/tests/disk/disk_copy.c:172:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	snprintf(s, sizeof(s), "/tmp/%s-disk-XXXXXX", getenv("USER"));
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:386:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	snprintf(s, sizeof(s), "/tmp/%s-disk-XXXXXX", getenv("USER"));
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_unpack.c:150:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	snprintf(s, sizeof(s), "/tmp/%s-disk-XXXXXX", getenv("USER"));
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:261:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	snprintf(s, sizeof(s), "/tmp/%s-disk-XXXXXX", getenv("USER"));
data/starpu-1.3.7+dfsg/tests/disk/mem_reclaim.c:229:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	snprintf(s, sizeof(s), "/tmp/%s-disk-XXXXXX", getenv("USER"));
data/starpu-1.3.7+dfsg/tests/helper.h:50:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/tests/loader.c:99:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	top_builddir = getenv("top_builddir");
data/starpu-1.3.7+dfsg/tests/loader.c:229:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *top_builddir = getenv ("top_builddir");
data/starpu-1.3.7+dfsg/tests/loader.c:241:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	launcher=getenv("STARPU_CHECK_LAUNCHER");
data/starpu-1.3.7+dfsg/tests/loader.c:242:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	launcher_args=getenv("STARPU_CHECK_LAUNCHER_ARGS");
data/starpu-1.3.7+dfsg/tests/loader.c:249:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	else if (getenv("STARPU_TIMEOUT_ENV"))
data/starpu-1.3.7+dfsg/tests/loader.c:252:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		timeout = strtol(getenv("STARPU_TIMEOUT_ENV"), NULL, 10);
data/starpu-1.3.7+dfsg/tests/loader.c:259:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		    getenv("TSAN_OPTIONS") != NULL)
data/starpu-1.3.7+dfsg/tests/loader.c:261:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv("ASAN_OPTIONS") != NULL ||
data/starpu-1.3.7+dfsg/tests/loader.c:262:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		    getenv("USAN_OPTIONS") != NULL ||
data/starpu-1.3.7+dfsg/tests/loader.c:263:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		    getenv("LSAN_OPTIONS") != NULL)
data/starpu-1.3.7+dfsg/tests/loader.c:273:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("MPIEXEC_TIMEOUT"))
data/starpu-1.3.7+dfsg/tests/loader.c:275:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		int mpiexec_timeout = strtol(getenv("MPIEXEC_TIMEOUT"), NULL, 10);
data/starpu-1.3.7+dfsg/tests/loader.c:354:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *top_srcdir = getenv("top_srcdir");
data/starpu-1.3.7+dfsg/tests/main/empty_task.c:42:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:t:h")) != -1)
data/starpu-1.3.7+dfsg/tests/main/multithreaded.c:87:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:t:h")) != -1)
data/starpu-1.3.7+dfsg/tests/main/regenerate.c:78:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:")) != -1)
data/starpu-1.3.7+dfsg/tests/main/regenerate_pipeline.c:82:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:")) != -1)
data/starpu-1.3.7+dfsg/tests/main/starpu_task_wait.c:58:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:t:h")) != -1)
data/starpu-1.3.7+dfsg/tests/main/starpu_task_wait_for_all.c:70:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:p:h")) != -1)
data/starpu-1.3.7+dfsg/tests/main/static_restartable.c:52:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:")) != -1)
data/starpu-1.3.7+dfsg/tests/main/static_restartable_tag.c:53:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:")) != -1)
data/starpu-1.3.7+dfsg/tests/main/static_restartable_using_initializer.c:56:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:")) != -1)
data/starpu-1.3.7+dfsg/tests/main/task_end_dep.c:22:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define FPRINTF(ofile, fmt, ...) do { if (!getenv("STARPU_SSILENT")) {fprintf(ofile, fmt, ## __VA_ARGS__); }} while(0)
data/starpu-1.3.7+dfsg/tests/main/wait_all_regenerable_tasks.c:63:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:")) != -1)
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:70:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:b:p:h")) != -1)
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:174:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *output_dir = getenv("STARPU_BENCH_DIR");
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:175:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *bench_id = getenv("STARPU_BENCH_ID");
data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c:143:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "n:s:c:ah")) != -1)
data/starpu-1.3.7+dfsg/tests/microbenchs/matrix_as_vector.c:160:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			char *output_dir = getenv("STARPU_BENCH_DIR");
data/starpu-1.3.7+dfsg/tests/microbenchs/matrix_as_vector.c:161:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			char *bench_id = getenv("STARPU_BENCH_ID");
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:80:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:b:p:h")) != -1)
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:150:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *output_dir = getenv("STARPU_BENCH_DIR");
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:151:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *bench_id = getenv("STARPU_BENCH_ID");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:67:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:b:p:h")) != -1)
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:191:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *output_dir = getenv("STARPU_BENCH_DIR");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:192:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *bench_id = getenv("STARPU_BENCH_ID");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:100:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "i:b:B:c:C:s:t:T:f:h")) != -1)
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:164:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *starpu_sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:293:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				char *output_dir = getenv("STARPU_BENCH_DIR");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:294:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				char *bench_id = getenv("STARPU_BENCH_ID");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:295:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_hierarchy.c:120:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("STARPU_SSILENT"))
data/starpu-1.3.7+dfsg/tests/sched_policies/data_locality.c:201:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/tests/sched_policies/execute_all_tasks.c:103:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/tests/sched_policies/prio.c:124:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/tests/sched_policies/simple_cpu_gpu_sched.c:263:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/tests/sched_policies/simple_deps.c:94:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *sched = getenv("STARPU_SCHED");
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_display.c:88:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "dls:p:a:f:hx", long_options, &option_index)) != -1)
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:188:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "ho:", long_options, &option_index)) != -1)
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid_str[16];
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:81:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE * f = fopen(path_file_start, "wb+");
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:93:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_file_end, "wb+");
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:127:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_file_end, "rb+");
data/starpu-1.3.7+dfsg/examples/basic_examples/variable.c:52:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (argc == 2) niter = atoi(argv[1]);
data/starpu-1.3.7+dfsg/examples/binary/binary.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char located_file_name[1024];
data/starpu-1.3.7+dfsg/examples/binary/binary.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char located_dir_name[1024];
data/starpu-1.3.7+dfsg/examples/binary/binary.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char opencl_program_source[16384];
data/starpu-1.3.7+dfsg/examples/cg/cg.c:385:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			n = (int long long)atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/cg/cg.c:391:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i_max = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/cg/cg.c:402:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nblocks = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_compil.c:184:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *f = fopen("cholesky.lp", "w");
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_compil.c:190:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *f = fopen("cholesky.mps", "w");
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_implicit.c:143:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *f = fopen("cholesky.lp", "w");
data/starpu-1.3.7+dfsg/examples/cholesky/cholesky_implicit.c:149:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *f = fopen("cholesky.mps", "w");
data/starpu-1.3.7+dfsg/examples/cpp/add_vectors_interface.cpp:452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*ptr, (void*)vector_interface->ptr, vector_interface->elemsize*vector_interface->nx);
data/starpu-1.3.7+dfsg/examples/cpp/add_vectors_interface.cpp:466:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)vector_interface->ptr, ptr, count);
data/starpu-1.3.7+dfsg/examples/filters/fplan_notautomatic.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[10000];
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu.c:824:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(Asaved, matA, (size_t)ld*ld*sizeof(float));
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_grain.c:356:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(Asaved, matA, ld*ld*sizeof(float));
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_kernels.c:70:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[64];
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_kernels.c:82:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[64];
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_kernels.c:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[64];
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_kernels.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[64];
data/starpu-1.3.7+dfsg/examples/heat/dw_factolu_tag.c:300:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(Asaved, matA, (size_t)ld*ld*sizeof(float));
data/starpu-1.3.7+dfsg/examples/heat/dw_sparse_cg_kernels.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, nx*elemsize);
data/starpu-1.3.7+dfsg/examples/heat/heat.c:368:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(savedB, B, subsize*sizeof(float));
data/starpu-1.3.7+dfsg/examples/heat/heat.c:385:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(LUB, B, subsize*sizeof(float));
data/starpu-1.3.7+dfsg/examples/heat/heat.c:744:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(B, result, newsize*sizeof(float));
data/starpu-1.3.7+dfsg/examples/incrementer/incrementer.c:62:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		niter = atoi(argv[1]);
data/starpu-1.3.7+dfsg/examples/interface/complex_codelet.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[100];
data/starpu-1.3.7+dfsg/examples/interface/complex_interface.c:143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, complex_interface->real, complex_interface->nx*sizeof(double));
data/starpu-1.3.7+dfsg/examples/interface/complex_interface.c:144:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data+complex_interface->nx*sizeof(double), complex_interface->imaginary, complex_interface->nx*sizeof(double));
data/starpu-1.3.7+dfsg/examples/interface/complex_interface.c:159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(complex_interface->real, data, complex_interface->nx*sizeof(double));
data/starpu-1.3.7+dfsg/examples/interface/complex_interface.c:160:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(complex_interface->imaginary, data+complex_interface->nx*sizeof(double), complex_interface->nx*sizeof(double));
data/starpu-1.3.7+dfsg/examples/lu/lu_example.c:219:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(A_saved, A, (size_t)size*size*sizeof(TYPE));
data/starpu-1.3.7+dfsg/examples/lu/lu_example.c:423:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *f = fopen("lu.pl", "w");
data/starpu-1.3.7+dfsg/examples/lu/lu_example.c:427:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen("lu.mps", "w");
data/starpu-1.3.7+dfsg/examples/lu/lu_example.c:431:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen("lu.dot", "w");
data/starpu-1.3.7+dfsg/examples/mandelbrot/mandelbrot.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[128] = "Mandelbrot - StarPU";
data/starpu-1.3.7+dfsg/examples/mandelbrot/mandelbrot.c:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char text[255];
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/ppm_downscaler.c:57:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *file = fopen(filename, "r");
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/ppm_downscaler.c:93:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *file = fopen(filename, "w+");
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename_in[1024];
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename_out[1024];
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:143:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f_in = fopen(filename_in, "r");
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:151:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f_out = fopen(filename_out, "w+");
data/starpu-1.3.7+dfsg/examples/profiling/profiling.c:45:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		niter = atoi(argv[1]);
data/starpu-1.3.7+dfsg/examples/profiling/profiling.c:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char workername[128];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mm_to_bcsr.c:244:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&bcsr->val[current_offset], current_block->val, block_size);
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mm_to_bcsr.c:327:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((f = fopen(filename, "r")) == NULL)
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:42:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((f = fopen(fname, "r")) == NULL)
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MM_MAX_LINE_LENGTH+1];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char banner[MM_MAX_TOKEN_LENGTH+1];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mtx[MM_MAX_TOKEN_LENGTH+1];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char crd[MM_MAX_TOKEN_LENGTH+1];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data_type[MM_MAX_TOKEN_LENGTH+1];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char storage_scheme[MM_MAX_TOKEN_LENGTH+1];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MM_MAX_LINE_LENGTH];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MM_MAX_LINE_LENGTH];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:323:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((f = fopen(fname, "r")) == NULL)
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:403:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	else if ((f = fopen(fname, "w")) == NULL)
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[MM_MAX_LINE_LENGTH];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:448:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *types[4];
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.h:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char MM_typecode[4];
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-kernels.c:155:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&block_data[offset], boundary_data, boundary_size);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-kernels.c:405:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newer, old, oldb->nx * oldb->ny * oldb->nz * sizeof(*newer));
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil-kernels.c:452:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(boundary_data, &block_data[offset], boundary_size);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:88:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nbz = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:93:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sizex = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:98:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sizey = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:103:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sizez = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:108:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			niter = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:113:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ticks = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:191:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[64];
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:312:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(who_runs_what, who_runs_what_tmp, nbz * who_runs_what_len * sizeof(*who_runs_what));
data/starpu-1.3.7+dfsg/examples/stencil/implicit-stencil.c:320:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(who_runs_what_index, who_runs_what_index_tmp, nbz * sizeof(*who_runs_what_index));
data/starpu-1.3.7+dfsg/examples/stencil/stencil-kernels.c:155:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&block_data[offset], boundary_data, boundary_size);
data/starpu-1.3.7+dfsg/examples/stencil/stencil-kernels.c:396:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newer, old, oldb->nx * oldb->ny * oldb->nz * sizeof(*newer));
data/starpu-1.3.7+dfsg/examples/stencil/stencil-kernels.c:443:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(boundary_data, &block_data[offset], boundary_size);
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:84:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nbz = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:89:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sizex = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:94:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sizey = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:99:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sizez = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:104:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			niter = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:109:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ticks = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:186:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[64];
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:309:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(who_runs_what, who_runs_what_tmp, nbz * who_runs_what_len * sizeof(*who_runs_what));
data/starpu-1.3.7+dfsg/examples/stencil/stencil.c:317:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(who_runs_what_index, who_runs_what_index_tmp, nbz * sizeof(*who_runs_what_index));
data/starpu-1.3.7+dfsg/include/starpu_disk.h:63:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void *  (*open)   (void *base, void *pos, size_t size);
data/starpu-1.3.7+dfsg/include/starpu_fxt.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char symbol[256];
data/starpu-1.3.7+dfsg/include/starpu_fxt.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char perfmodel_archname[256];
data/starpu-1.3.7+dfsg/include/starpu_fxt.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *filenames[STARPU_FXT_MAX_FILES];
data/starpu-1.3.7+dfsg/include/starpu_fxt.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char worker_names[STARPU_NMAXWORKERS][256];
data/starpu-1.3.7+dfsg/include/starpu_perfmodel.h:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char debug_path[256];
data/starpu-1.3.7+dfsg/include/starpu_task.h:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cuda_flags[STARPU_MAXIMPLEMENTATIONS];
data/starpu-1.3.7+dfsg/include/starpu_task.h:369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opencl_flags[STARPU_MAXIMPLEMENTATIONS];
data/starpu-1.3.7+dfsg/include/starpu_task.h:410:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *cpu_funcs_name[STARPU_MAXIMPLEMENTATIONS];
data/starpu-1.3.7+dfsg/include/starpu_util.h:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char xmessage[256]; starpu_strerror_r(-err, xmessage, 256); \
data/starpu-1.3.7+dfsg/include/starpu_util.h:314:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char xmessage[256]; starpu_strerror_r(-err, xmessage, 256); \
data/starpu-1.3.7+dfsg/include/starpu_worker.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char visited[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/include/starpu_worker.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char present[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/include/starpu_worker.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char is_unblocked[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/include/starpu_worker.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char is_master[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/min-dgels/additional/dlarfb.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/additional/dormlq.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/additional/dormlq.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/additional/dormqr.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/additional/fio.h:18:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN fopen
data/starpu-1.3.7+dfsg/min-dgels/additional/ilaenv.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c1[1], c2[1], c3[1], c4[1];
data/starpu-1.3.7+dfsg/min-dgels/additional/ilaenv.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char subnam[1];
data/starpu-1.3.7+dfsg/min-dgels/additional/s_cat.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lp0, lp1, L);
data/starpu-1.3.7+dfsg/min-dgels/base/BLAS/SRC/xerbla_array.c:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char srname[32];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/arithchk.c:192:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("arith.h", "w");
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/ctype.h:9:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char My_ctype[264] = {
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/endfile.c:18:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
extern FILE *tmpfile();
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/endfile.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char nbuf[10];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/endfile.c:45:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(nbuf,"fort.%ld",(long)a->aunit);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/endfile.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/endfile.c:111:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	 || !(tf = tmpfile())) {
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/fio.h:18:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN fopen
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/fmtlib.c:22:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[MAXINTLENGTH+1];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/getenv_.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256], *ep, *fp;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/inquire.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lread.c:54:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char f__ltab[128+1] = {	/* offset one for EOF */
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lread.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[FMAX+EXPMAXDIGS+4];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lread.c:162:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		f__lcount = atoi(s);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lread.c:220:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sp+1, "e%ld", exp);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lread.c:344:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char nmLbuf[256], *nmL_next;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lwrite.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[LEFBL];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lwrite.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ba, *bb, bufa[LEFBL], bufb[LEFBL];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:33:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
Const char *f__r_mode[2] = {"r", "r"};
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:34:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
Const char *f__w_mode[4] = {"w", "w", "r+w", "r+w"};
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:36:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
Const char *f__r_mode[2] = {"rb", "r"};
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:37:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
Const char *f__w_mode[4] = {"wb", "w", "r+b", "r+"};
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:40:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char f__buf0[400], *f__buf = f__buf0;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256], *s;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:192:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "fort.%ld", (long)a->ounit);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:215:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		(void) strcpy(buf,"tmp.FXXXXXX");
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:219:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		if (!(b->ufd = tmpfile()))
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{	char nbuf[10];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:287:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void) sprintf(nbuf,"fort.%ld",(long)n);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rawio.h:7:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open _open
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rawio.h:17:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
extern int creat(const char*,int), open(const char*,int);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rdfmt.c:33:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char hex[256];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rdfmt.c:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[FMAX+EXPMAXDIGS+4];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rdfmt.c:382:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sp+1, "e%ld", exp);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rsne.c:150:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char Alpha[256], Alphanum[256];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rsne.c:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_cat.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lp0, lp1, L);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_paus.c:70:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fin = fopen("con", "r");
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/system_.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff0[256], *buff;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[FMAX+EXPMAXDIGS+4], *s, *se;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:90:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf,"%#.*E", d, dd);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:114:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(se, "%+.2d", atoi(se) + 1 - f__scale);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:114:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sprintf(se, "%+.2d", atoi(se) + 1 - f__scale);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:117:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(se, "%+.2d", atoi(se) + 1 - f__scale);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:117:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sprintf(se, "%+.2d", atoi(se) + 1 - f__scale);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:119:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(se, "+00");
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *b, buf[MAXINTDIGS+MAXFRACDIGS+4], *s;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:243:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(b = buf, "%#.*f", d, x);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:246:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	n = sprintf(b = buf, "%#.*f", d, x) + d1;
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbcon.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbrfs.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbrfsx.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char norm[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgbsvx.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char norm[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgecon.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeev.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char side[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeevx.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char job[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgeevx.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char side[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgegv.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chtemp[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgerfs.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgerfsx.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char norm[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesvd.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgesvx.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char norm[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggev.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chtemp[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dggevx.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chtemp[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtrfs.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transn[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtrfs.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dgtsvx.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char norm[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhgeqz.c:55:6:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    atol, btol, temp;
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhgeqz.c:515:67:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    if ((d__1 = h__[ilast + (ilast - 1) * h_dim1], abs(d__1)) <= atol)
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhgeqz.c:537:56:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((d__1 = h__[j + (j - 1) * h_dim1], abs(d__1)) <= atol) {
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhgeqz.c:562:37:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			    d__1))) <= temp2 * (ascale * atol)) {
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhgeqz.c:823:17:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		     ascale * atol * temp2) {
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dhseqr.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gbrfsx_extended.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gbrfsx_extended.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gerfsx_extended.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_gerfsx_extended.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dla_syrcond.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaein.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaein.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr0.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jbcmpz[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlaqr4.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jbcmpz[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarfb.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dlarzb.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormbr.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormbr.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormhr.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormlq.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormlq.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormql.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormqr.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormrq.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormrq.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormrz.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormrz.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dormtr.c:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpbcon.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dpocon.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dporfsx.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char norm[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dppcon.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbevx.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char order[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgv.c:26:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vect[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgvd.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vect[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgvx.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vect[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsbgvx.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char order[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspevx.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char order[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspgv.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspgvd.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dspgvx.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstevr.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char order[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dstevx.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char order[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyevr.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char order[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyevx.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char order[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygv.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygvd.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsygvx.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trans[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dsyrfsx.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char norm[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtbcon.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtbrfs.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtpcon.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtprfs.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrcon.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char normin[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrrfs.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transt[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/dtrtri.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch__1[2];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaenv.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c1[1], c2[1], c3[1], c4[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaenv.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char subnam[1];
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/xerbla_array.c:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char srname[32];
data/starpu-1.3.7+dfsg/mpi/examples/matrix_mult/mm.c:311:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		N = atoi(argv[1]);
data/starpu-1.3.7+dfsg/mpi/examples/matrix_mult/mm.c:319:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			BS = atoi(argv[2]);
data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_outofcore_example.c:170:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(filename, O_WRONLY|O_CREAT|O_TRUNC, 0777);
data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_outofcore_example.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[sizeof(nblocks)*3 + 1 + sizeof(nblocks)*3 + 1];
data/starpu-1.3.7+dfsg/mpi/examples/stencil/stencil5_lb.c:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sleep_thr[10];
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/my_interface.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[100]="";
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/my_interface.c:225:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*ptr, &d, sizeof(int));
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/my_interface.c:228:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(x, &c, sizeof(char));
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/my_interface.c:242:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&data->d, ptr, sizeof(int));
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/my_interface.c:245:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&data->c, x, sizeof(char));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.c:193:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, &dm_interface->size, sizeof(int));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.c:196:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data+sizeof(int), dm_interface->tags, (dm_interface->size*sizeof(starpu_mpi_tag_t)));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.c:197:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data+sizeof(int)+(dm_interface->size*sizeof(starpu_mpi_tag_t)), dm_interface->ranks, dm_interface->size*sizeof(int));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.c:213:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&size, data, sizeof(int));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.c:220:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dm_interface->tags, data+sizeof(int), dm_interface->size*sizeof(starpu_mpi_tag_t));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/data_movements_interface.c:221:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dm_interface->ranks, data+sizeof(int)+(dm_interface->size*sizeof(starpu_mpi_tag_t)), dm_interface->size*sizeof(int));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_data_interface.c:197:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, ld_interface, *count);
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_data_interface.c:212:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ld_interface, data, count);
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_heat_propagation.c:375:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(itf_dst, itf_src, itf_load_data->interface_size);
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_heat_propagation.c:423:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(user_itf, itf, sizeof(struct starpu_mpi_lb_conf));
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_heat_propagation.c:444:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sleep_task_threshold = atoi(sleep_env);
data/starpu-1.3.7+dfsg/mpi/src/load_balancer/policy/load_heat_propagation.c:456:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		time_threshold = atoi(time_env);
data/starpu-1.3.7+dfsg/mpi/src/mpi/starpu_mpi_comm.c:178:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(status, &_comm->status, sizeof(*status));
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_datatype.c:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char datatype_name[MPI_MAX_OBJECT_NAME];
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_fortran.c:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s, _s, len);
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_init.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hostname[65];
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_private.c:54:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char str[MPI_MAX_OBJECT_NAME];
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_private.h:111:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char _comm_name[128]; \
data/starpu-1.3.7+dfsg/mpi/src/starpu_mpi_stats.c:75:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(comm_amounts, comm_amount, world_size * sizeof(size_t));
data/starpu-1.3.7+dfsg/mpi/tests/user_defined_datatype_value.h:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*ptr, value_interface->value, sizeof(int));
data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/throughput_lp_policy.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/throughput_lp_policy.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/throughput_lp_policy.c:151:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:148:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:168:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:295:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:402:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:545:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:599:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:619:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/lp_programs.c:642:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/sc_hypervisor/src/policies_utils/task_pool.c:96:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_tp, tp, sizeof(struct sc_hypervisor_policy_task_pool));
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:266:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int sp = stop_print ? atoi(stop_print) : 1;
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:328:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen("overhead_microsec", "a");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:330:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(sched_env, "a");
data/starpu-1.3.7+dfsg/sc_hypervisor/src/sc_hypervisor.c:1537:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return lazy ? atoi(lazy)  : 1;
data/starpu-1.3.7+dfsg/socl/examples/basic/basic.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vendor[256];
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:58:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char str[4096];
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:87:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char str[4096];
data/starpu-1.3.7+dfsg/socl/examples/clinfo/clinfo.c:175:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char val[size]; \
data/starpu-1.3.7+dfsg/socl/examples/matmul/matmul.c:301:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[2048];
data/starpu-1.3.7+dfsg/socl/examples/testmap/testmap.c:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vendor[256];
data/starpu-1.3.7+dfsg/socl/src/cl_buildprogram.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opts[4096];
data/starpu-1.3.7+dfsg/socl/src/cl_createbuffer.c:142:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mem->ptr, host_ptr, size);
data/starpu-1.3.7+dfsg/socl/src/cl_createcommandqueue.c:60:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int force_dynamic = fd == NULL ? 0 : atoi(fd);
data/starpu-1.3.7+dfsg/socl/src/cl_createcontext.c:115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->properties, properties, sizeof(cl_context_properties) * ctx->num_properties);
data/starpu-1.3.7+dfsg/socl/src/cl_createcontext.c:144:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->devices, devices, sizeof(cl_device_id)*num_devices);
data/starpu-1.3.7+dfsg/socl/src/cl_enqueuecopybuffer.c:54:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst+cmd->dst_offset, src+cmd->src_offset, cmd->cb);
data/starpu-1.3.7+dfsg/socl/src/cl_enqueuereadbuffer.c:33:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cmd->ptr, ptr+cmd->offset, cmd->cb);
data/starpu-1.3.7+dfsg/socl/src/cl_enqueuewritebuffer.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr+cmd->offset, cmd->ptr, cmd->cb);
data/starpu-1.3.7+dfsg/socl/src/cl_setkernelarg.c:97:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(kernel->arg_value[arg_index], arg_value, arg_size);
data/starpu-1.3.7+dfsg/socl/src/getinfo.h:23:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(param_value, &var, sizeof(var)); \
data/starpu-1.3.7+dfsg/socl/src/getinfo.h:54:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(param_value, var, size); \
data/starpu-1.3.7+dfsg/socl/src/init.c:141:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int skip = (skip_str != NULL ? atoi(skip_str) : 0);
data/starpu-1.3.7+dfsg/socl/src/util.c:38:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s,p,size);
data/starpu-1.3.7+dfsg/src/common/fxt.c:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _starpu_prof_file_user[128];
data/starpu-1.3.7+dfsg/src/common/fxt.c:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char suffix[127];
data/starpu-1.3.7+dfsg/src/common/fxt.c:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[128];
data/starpu-1.3.7+dfsg/src/common/fxt.h:329:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)futargs)[len - 1] = '\0';				\
data/starpu-1.3.7+dfsg/src/common/fxt.h:355:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)futargs)[len - 1] = '\0';				\
data/starpu-1.3.7+dfsg/src/common/fxt.h:379:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)futargs)[len - 1] = '\0';				\
data/starpu-1.3.7+dfsg/src/common/fxt.h:404:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)futargs)[len - 1] = '\0';				\
data/starpu-1.3.7+dfsg/src/common/fxt.h:430:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)futargs)[len - 1] = '\0';				\
data/starpu-1.3.7+dfsg/src/common/fxt.h:457:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)futargs)[len - 1] = '\0';				\
data/starpu-1.3.7+dfsg/src/common/fxt.h:485:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)futargs)[len - 1] = '\0';				\
data/starpu-1.3.7+dfsg/src/common/fxt.h:618:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char __buf[FXT_MAX_PARAMS*sizeof(long)];	\
data/starpu-1.3.7+dfsg/src/common/fxt.h:642:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _archname[32]=""; \
data/starpu-1.3.7+dfsg/src/common/fxt.h:1118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __buf[(FXT_MAX_PARAMS-2)*sizeof(long)]; \
data/starpu-1.3.7+dfsg/src/common/utils.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char drive[_MAX_DRIVE];
data/starpu-1.3.7+dfsg/src/common/utils.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[_MAX_DIR];
data/starpu-1.3.7+dfsg/src/common/utils.c:213:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*fd = open(baseCpy, flags);
data/starpu-1.3.7+dfsg/src/common/utils.c:225:8:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	*fd = mkstemp(baseCpy);
data/starpu-1.3.7+dfsg/src/common/utils.c:265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[len + depth*4 + 1];
data/starpu-1.3.7+dfsg/src/common/utils.c:281:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path, directory, len+1);
data/starpu-1.3.7+dfsg/src/core/combined_workers.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&combined_worker->combined_workerid, workerid_array, nworkers*sizeof(int));
data/starpu-1.3.7+dfsg/src/core/debug.c:54:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	logfile = fopen(logfile_name, "w+");
data/starpu-1.3.7+dfsg/src/core/debug.h:145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char __buf[32]; \
data/starpu-1.3.7+dfsg/src/core/debug.h:182:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char __buf[32]; \
data/starpu-1.3.7+dfsg/src/core/debug.h:214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char __buf[32]; \
data/starpu-1.3.7+dfsg/src/core/debug.h:262:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char __buf[32]; \
data/starpu-1.3.7+dfsg/src/core/detect_combined_workers.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/starpu-1.3.7+dfsg/src/core/disk.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/starpu-1.3.7+dfsg/src/core/disk.c:351:46:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return disk_register_list[node]->functions->open(disk_register_list[node]->base, pos, size);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_hdf5.c:673:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name_id[16];
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_leveldb.cpp:131:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, (void *) (value_read+offset), size);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_leveldb.cpp:158:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*ptr, value.c_str(), *size);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_leveldb.cpp:193:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, (void *) value_read, tmp->size);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_leveldb.cpp:196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) ((uintptr_t) buffer + offset), (void *) buf_tmp, size);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c:99:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int id = open(obj->path, O_RDWR);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c:189:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int id = open(baseCpy, O_RDWR);
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:178:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int id = open(obj->path, obj->flags);
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:260:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int id = open(baseCpy, obj->flags);
data/starpu-1.3.7+dfsg/src/core/jobs.c:784:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(new, &worker->local_ordered_tasks[worker->current_ordered_task], copied * sizeof(*new));
data/starpu-1.3.7+dfsg/src/core/jobs.c:785:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(new + copied, worker->local_ordered_tasks, (worker->local_ordered_tasks_size - copied) * sizeof(*new));
data/starpu-1.3.7+dfsg/src/core/parallel_task.c:32:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(task_dup, task, sizeof(struct starpu_task));
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:71:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(filepath, "a+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char directory[300];
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filepath[400];
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:294:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(filepath, "a+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:343:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(filepath, "a+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:348:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(filepath, "w+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:114:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cudadev_direct[STARPU_MAXNODES][STARPU_MAXNODES];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:710:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d_buffer, h_buffer, SIZE);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:720:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d_buffer, h_buffer, 1);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:859:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[65];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:882:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:887:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:956:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:963:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "w+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:985:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cudadev_timing_per_numa_sorted, cudadev_timing_per_numa, STARPU_MAXCUDADEVS*STARPU_MAXNUMANODES*sizeof(struct dev_timing));
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1006:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(opencldev_timing_per_numa_sorted, opencldev_timing_per_numa, STARPU_MAXOPENCLDEVS*STARPU_MAXNUMANODES*sizeof(struct dev_timing));
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1053:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1058:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1081:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1176:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1320:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "w+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1483:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1519:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1671:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1676:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "w+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1822:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bandwidth_path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1823:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char affinity_path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1824:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char latency_path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1842:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[128];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1850:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[128];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1863:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[128];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1938:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2012:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2044:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(path, "r");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2116:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "w+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2618:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2647:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "w+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2744:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char i_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2766:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char i_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2783:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char i_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2787:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char j_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2866:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char i_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2875:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char i_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2879:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char j_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2898:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char i_name[16];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:2935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ignore_devid[STARPU_ANY_WORKER];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[STR_LONG_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:796:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1055:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[STR_LONG_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[STR_LONG_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[STR_LONG_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1177:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "w+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[STR_LONG_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1384:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(path, "r");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1453:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[STR_LONG_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1484:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(filename, "r");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devices[STR_VERY_LONG_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1582:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1615:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1668:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1715:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1767:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1798:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:1928:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char archname[STR_SHORT_LENGTH];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:2023:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *f = fopen(per_arch_model->debug_path, "a+");
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_print.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char archname[32];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_print.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char debugname[1024];
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_print.c:154:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char debugname[256];
data/starpu-1.3.7+dfsg/src/core/perfmodel/regression.c:187:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sorted, y, n * sizeof(*sorted));
data/starpu-1.3.7+dfsg/src/core/sched_ctx.c:1036:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(backup_workerids, workerids, nworkers_ctx*sizeof(backup_workerids[0]));
data/starpu-1.3.7+dfsg/src/core/sched_ctx.c:1277:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(chg->workerids_to_change, workerids_to_change, nworkers_to_change * sizeof(chg->workerids_to_change[0]));
data/starpu-1.3.7+dfsg/src/core/sched_ctx.c:1283:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(chg->workerids_to_notify, workerids_to_notify, nworkers_to_notify * sizeof(chg->workerids_to_notify[0]));
data/starpu-1.3.7+dfsg/src/core/sched_ctx.c:1303:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cumulated_workerids, ctx_workerids, ctx_nworkers*sizeof(cumulated_workerids[0]));
data/starpu-1.3.7+dfsg/src/core/sched_ctx.c:1378:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cumulated_workerids, ctx_workerids, ctx_nworkers*sizeof(cumulated_workerids[0]));
data/starpu-1.3.7+dfsg/src/core/sched_ctx.c:1817:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[256];
data/starpu-1.3.7+dfsg/src/core/sched_policy.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(policy, sched_policy, sizeof(*policy));
data/starpu-1.3.7+dfsg/src/core/sched_policy.c:1014:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&profiling_info->pop_start_time,
data/starpu-1.3.7+dfsg/src/core/sched_policy.c:1164:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(starpu_idle_file, "a");
data/starpu-1.3.7+dfsg/src/core/simgrid.c:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_prefix[32];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mpiname[32];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[256];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[32];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:881:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[64];
data/starpu-1.3.7+dfsg/src/core/simgrid.c:1210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/starpu-1.3.7+dfsg/src/core/task.c:876:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[_STARPU_CODELET_WORKER_NAME_LEN];
data/starpu-1.3.7+dfsg/src/core/topology.c:73:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char * cpu_name[STARPU_MAXCPUS];
data/starpu-1.3.7+dfsg/src/core/topology.c:471:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(workers_gpuid,
data/starpu-1.3.7+dfsg/src/core/topology.c:548:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(topology->workers_opencl_gpuid, tmp, sizeof(unsigned)*STARPU_NMAXWORKERS);
data/starpu-1.3.7+dfsg/src/core/topology.c:582:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(topology->workers_opencl_gpuid, tmp, sizeof(unsigned)*STARPU_NMAXWORKERS);
data/starpu-1.3.7+dfsg/src/core/topology.c:676:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mic_idx_env[32];
data/starpu-1.3.7+dfsg/src/core/topology.c:681:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nb_mic_env[32];
data/starpu-1.3.7+dfsg/src/core/topology.c:686:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mic_sink_program_path[1024];
data/starpu-1.3.7+dfsg/src/core/topology.c:960:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(topology->workers_bindid,
data/starpu-1.3.7+dfsg/src/core/topology.c:2111:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32];
data/starpu-1.3.7+dfsg/src/core/topology.c:2181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/starpu-1.3.7+dfsg/src/core/topology.c:2577:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[16];
data/starpu-1.3.7+dfsg/src/core/topology.c:2620:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
											char name[64];
data/starpu-1.3.7+dfsg/src/core/topology.c:2677:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[16];
data/starpu-1.3.7+dfsg/src/core/topology.c:3009:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[256];
data/starpu-1.3.7+dfsg/src/core/workers.c:1115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char string[128];
data/starpu-1.3.7+dfsg/src/core/workers.c:1135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[128];
data/starpu-1.3.7+dfsg/src/core/workers.c:1258:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (perturb && perturb[0] && atoi(perturb) != 0)
data/starpu-1.3.7+dfsg/src/core/workers.c:1339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(copy, _starpu_config.conf.cuda_opengl_interoperability, size);
data/starpu-1.3.7+dfsg/src/core/workers.c:1347:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(copy, _starpu_config.conf.not_launched_drivers, size);
data/starpu-1.3.7+dfsg/src/core/workers.c:2403:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[256];
data/starpu-1.3.7+dfsg/src/core/workers.h:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[128];
data/starpu-1.3.7+dfsg/src/core/workers.h:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char short_name[32];
data/starpu-1.3.7+dfsg/src/core/workers.h:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char padding[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/src/core/workers.h:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char padding[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/src/core/workers.h:362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char currently_bound[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/src/core/workers.h:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char currently_shared[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/src/core/workers.h:389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char padding1[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/src/core/workers.h:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char padding2[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/src/datawizard/copy_driver.c:279:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char src_name[16], dst_name[16];
data/starpu-1.3.7+dfsg/src/datawizard/datastats.c:70:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[128];
data/starpu-1.3.7+dfsg/src/datawizard/datastats.c:108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[128];
data/starpu-1.3.7+dfsg/src/datawizard/filters.c:727:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char handles_sequential_consistency[nparts+1];
data/starpu-1.3.7+dfsg/src/datawizard/filters.c:883:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char handles_sequential_consistency[nparts+1];
data/starpu-1.3.7+dfsg/src/datawizard/filters.c:892:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char handles_sequential_consistency[nparts+1];
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_interface.c:453:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, (void*)bcsr->colind, bcsr->nnz * sizeof(bcsr->colind[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_interface.c:455:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, (void*)bcsr->rowptr, (bcsr->nrow + 1) * sizeof(bcsr->rowptr[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_interface.c:458:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, (void*)bcsr->nzval, bcsr->r * bcsr->c * bcsr->nnz * bcsr->elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_interface.c:475:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void*)bcsr->colind, tmp, bcsr->nnz * sizeof(bcsr->colind[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_interface.c:477:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void*)bcsr->rowptr, tmp, (bcsr->nrow + 1) * sizeof(bcsr->rowptr[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/bcsr_interface.c:480:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)bcsr->nzval, tmp, bcsr->r * bcsr->c * bcsr->nnz * bcsr->elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_interface.c:223:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cur, block, nx * ny * nz * elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_interface.c:231:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cur, block_z, nx * ny * elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_interface.c:239:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(cur, block_y, nx*elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_interface.c:273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(block, cur, nx * ny * nz * elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_interface.c:281:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(block_z, cur, nx * ny * elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/block_interface.c:289:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(block_y, cur, nx*elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_interface.c:392:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, (void*)csr->colind, csr->nnz * sizeof(csr->colind[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_interface.c:394:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, (void*)csr->rowptr, (csr->nrow + 1) * sizeof(csr->rowptr[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_interface.c:397:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, (void*)csr->nzval, csr->nnz * csr->elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_interface.c:414:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void*)csr->colind, tmp, csr->nnz * sizeof(csr->colind[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_interface.c:416:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void*)csr->rowptr, tmp, (csr->nrow + 1) * sizeof(csr->rowptr[0]));
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/csr_interface.c:419:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)csr->nzval, tmp, csr->nnz * csr->elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/data_interface.c:426:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(replicate->data_interface, handle->per_node[STARPU_MAIN_RAM].data_interface, interfacesize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/matrix_interface.c:239:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cur, matrix, nx*ny*elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/matrix_interface.c:245:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cur, matrix, nx*elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/matrix_interface.c:272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(matrix, ptr, nx*ny*elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/matrix_interface.c:279:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(matrix, cur, nx*elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/multiformat_interface.c:382:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst_multiformat->cpu_ptr, src_multiformat->cpu_ptr, size);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/variable_interface.c:171:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*ptr, (void*)variable_interface->ptr, variable_interface->elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/variable_interface.c:186:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)variable_interface->ptr, ptr, variable_interface->elemsize);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/vector_interface.c:216:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*ptr, (void*)vector_interface->ptr, vector_interface->elemsize*vector_interface->nx);
data/starpu-1.3.7+dfsg/src/datawizard/interfaces/vector_interface.c:230:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)vector_interface->ptr, ptr, count);
data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c:526:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_replicate->data_interface, data_interface, mc->size_interface);
data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c:1061:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c:1283:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32];
data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c:1365:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mc->chunk_interface, replicate->data_interface, mc->size_interface);
data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c:1475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data_interface[size];
data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c:1477:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data_interface, replicate->data_interface, handle->ops->interface_size);
data/starpu-1.3.7+dfsg/src/datawizard/memalloc.c:1596:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(replicate->data_interface, data_interface, handle->ops->interface_size);
data/starpu-1.3.7+dfsg/src/datawizard/memory_nodes.c:28:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char _starpu_worker_drives_memory[STARPU_NMAXWORKERS][STARPU_MAXNODES];
data/starpu-1.3.7+dfsg/src/datawizard/memory_nodes.h:34:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char _starpu_worker_drives_memory[STARPU_NMAXWORKERS][STARPU_MAXNODES];
data/starpu-1.3.7+dfsg/src/debug/traces/anim.c:66:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		comp->workerid = atoi(name+7);
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cpus_worker_colors[CPUS_WORKER_COLORS_NB] = {"/greens9/7", "/greens9/6", "/greens9/5", "/greens9/4",  "/greens9/9", "/greens9/3",  "/greens9/2",  "/greens9/1"  };
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cuda_worker_colors[CUDA_WORKER_COLORS_NB] = {"/ylorrd9/9", "/ylorrd9/6", "/ylorrd9/3", "/ylorrd9/1", "/ylorrd9/8", "/ylorrd9/7", "/ylorrd9/4", "/ylorrd9/2",  "/ylorrd9/1"};
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *opencl_worker_colors[OPENCL_WORKER_COLORS_NB] = {"/blues9/9", "/blues9/6", "/blues9/3", "/blues9/1", "/blues9/8", "/blues9/7", "/blues9/4", "/blues9/2",  "/blues9/1"};
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *mic_worker_colors[MIC_WORKER_COLORS_NB] = {"/reds9/9", "/reds9/6", "/reds9/3", "/reds9/1", "/reds9/8", "/reds9/7", "/reds9/4", "/reds9/2",  "/reds9/1"};
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *mpi_ms_worker_colors[MPI_MS_WORKER_COLORS_NB] = {"/reds9/9", "/reds9/6", "/reds9/3", "/reds9/1", "/reds9/8", "/reds9/7", "/reds9/4", "/reds9/2",  "/reds9/1"};
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *other_worker_colors[OTHER_WORKER_COLORS_NB] = {"/greys9/9", "/greys9/8", "/greys9/7", "/greys9/6"};
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *worker_colors[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:441:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char _starpu_last_codelet_symbol[STARPU_NMAXWORKERS][(FXT_MAX_PARAMS-5)*sizeof(unsigned long)];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:444:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char last_codelet_parameter_description[STARPU_NMAXWORKERS][MAX_PARAMETERS][FXT_MAX_PARAMS*sizeof(unsigned long)];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:652:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned long nodeid = atoi(str);
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:663:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char program_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:665:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_thread_container_alias[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:667:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_thread_container_name[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:733:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:768:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:769:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p_handle[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:774:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p_dest[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:775:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p_info[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:776:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p_size[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:799:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:814:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:829:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:846:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:862:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:877:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:892:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:910:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:927:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:939:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:941:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char size_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:942:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parameters_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:943:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char footprint_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:944:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tag_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:945:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char jobid_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:946:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char submitorder_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:947:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gflop_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:948:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char X_str[STARPU_POTI_STR_LEN], Y_str[STARPU_POTI_STR_LEN], Z_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:949:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char iteration_str[STARPU_POTI_STR_LEN], subiteration_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:988:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:999:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1010:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char program_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_memnode_container_alias[STARPU_POTI_STR_LEN], new_memnode_container_name[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_memmanager_container_alias[STARPU_POTI_STR_LEN], new_memmanager_container_name[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1242:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_worker_container_name[STARPU_TRACE_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_thread_container_alias[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1257:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_worker_container_alias[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1259:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char memnode_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1261:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_thread_container_name[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char worker_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char color[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1353:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char alias[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1424:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ctx[10];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1537:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1538:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ctx[6];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parameters[256];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1678:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1679:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char typectx[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1684:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1687:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char size_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1688:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char parameters_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1689:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char footprint_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1690:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tag_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1691:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char jobid_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1692:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char submitorder_str[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1767:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:1856:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char paje_value[STARPU_POTI_STR_LEN], container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paje_value[STARPU_POTI_STR_LEN], container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paje_value[STARPU_POTI_STR_LEN], container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paje_value[STARPU_POTI_STR_LEN], memnode_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paje_value[STARPU_POTI_STR_LEN], memnode_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2267:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char paje_value[STARPU_POTI_STR_LEN], paje_key[STARPU_POTI_STR_LEN], src_memnode_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2268:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char program_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2307:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paje_value[STARPU_POTI_STR_LEN], paje_key[STARPU_POTI_STR_LEN], src_worker_container[STARPU_POTI_STR_LEN], dst_worker_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2308:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char program_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2384:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char paje_value[STARPU_POTI_STR_LEN], paje_key[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2385:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dst_memnode_container[STARPU_POTI_STR_LEN], program_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2515:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char memnode_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2593:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2598:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char paje_value[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2627:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2632:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paje_value[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[32];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[32];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2906:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN], paje_value[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2927:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char program_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2929:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_mpicommthread_container_alias[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:2958:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mpicommthread_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3254:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3280:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3306:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char src_memnode_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3319:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dst_memnode_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3348:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3368:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_in = open(filename_in, O_RDONLY);
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3394:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_program_container_alias[STARPU_POTI_STR_LEN], new_program_container_name[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:3398:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_scheduler_container_alias[STARPU_POTI_STR_LEN], new_scheduler_container_name[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char paje_value[STARPU_POTI_STR_LEN], paje_key[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4101:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dst_memnode_container[STARPU_POTI_STR_LEN], program_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4243:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		distrib_time = fopen(options->distrib_time_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4271:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		activity_file = fopen(options->activity_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4284:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		anim_file = fopen(options->anim_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4299:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		tasks_file = fopen(options->tasks_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4312:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		data_file = fopen(options->data_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4339:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		trace_file = fopen(options->states_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4395:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		out_paje_file = fopen(options->out_paje_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4442:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_in = open(filename_in, O_RDONLY);
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4588:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char file_prefix[32];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4653:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		kernel->file = fopen(codelet_name, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4668:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_in = open(filename_in, O_RDONLY);
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:4682:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	codelet_list = fopen("codelet_list", "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.h:46:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char _starpu_last_codelet_symbol[STARPU_NMAXWORKERS][(FXT_MAX_PARAMS-5)*sizeof(unsigned long)];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt_dag.c:37:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out_file = fopen(out_path, "w+");
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt_mpi.c:48:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_in = open(filename_in, O_RDONLY);
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt_mpi.c:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mpi_container[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt_mpi.c:318:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char paje_value[STARPU_POTI_STR_LEN], paje_key[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt_mpi.c:323:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str_mpi_tag[STARPU_POTI_STR_LEN];
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_paje.c:374:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char inctx[10];
data/starpu-1.3.7+dfsg/src/dolib.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024];
data/starpu-1.3.7+dfsg/src/dolib.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/starpu-1.3.7+dfsg/src/drivers/cpu/driver_cpu.c:470:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) (dst + dst_offset), (void *) (src + src_offset), size);
data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.c:70:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char used_stream[STARPU_NMAXWORKERS];
data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[30];
data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.c:729:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char devname[64];
data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.c:737:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char busid[13];
data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.c:772:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char thread_name[16];
data/starpu-1.3.7+dfsg/src/drivers/driver_common/driver_common.c:195:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&profiling_info->start_time, &worker->cl_start, sizeof(struct timespec));
data/starpu-1.3.7+dfsg/src/drivers/driver_common/driver_common.c:196:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&profiling_info->end_time, &worker->cl_end, sizeof(struct timespec));
data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_source.c:147:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(kernel->name, func_name, func_name_size);
data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_source.c:540:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char thread_name[16];
data/starpu-1.3.7+dfsg/src/drivers/mp_common/mp_common.c:171:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			node->devid = atoi(starpu_getenv("_STARPU_MIC_DEVID"));
data/starpu-1.3.7+dfsg/src/drivers/mp_common/mp_common.c:172:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			node->nb_mp_sinks = atoi(starpu_getenv("_STARPU_MIC_NB"));
data/starpu-1.3.7+dfsg/src/drivers/mp_common/mp_common.c:346:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(node->buffer, &command, command_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/mp_common.c:347:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*) ((uintptr_t)node->buffer + command_size), &arg_size, arg_size_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/sink_common.c:747:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(interface, (void*) arg_ptr, sizeof(union _starpu_interface));
data/starpu-1.3.7+dfsg/src/drivers/mp_common/sink_common.c:758:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(task->cl_arg, (void *) arg_ptr, cl_arg_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:221:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(message->buffer, arg, arg_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:323:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (buf, arg, arg_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:364:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(func_ptr, arg, arg_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy ((void*) buffer_ptr, interfaces[i], handle->ops->interface_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:461:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void*) buffer_ptr, cl_arg, cl_arg_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:541:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, arg, arg_size);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:821:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char actual_cpy[1024];
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:827:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[1024];
data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_source.c:168:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kernel->name, func_name, func_name_size);
data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_source.c:332:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char thread_name[16];
data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_source.c:338:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char thread_name[16];
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[30];
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl.c:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[1024], vendor[1024];
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl.c:641:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[64];
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:159:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fh = fopen(filename, "r");
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:188:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fh = fopen(filename, "r");
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char binary_directory[1024];
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:336:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char binary_file_name[2048];
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:351:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fh = fopen(binary_file_name, "w");
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_build_options[1024];
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char         binary_file_name[1024];
data/starpu-1.3.7+dfsg/src/profiling/bound.c:839:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/src/profiling/bound.c:941:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32];
data/starpu-1.3.7+dfsg/src/profiling/bound.c:961:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[23];
data/starpu-1.3.7+dfsg/src/profiling/bound.c:1032:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/src/profiling/bound.c:1058:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/src/profiling/bound.c:1084:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32], title[64];
data/starpu-1.3.7+dfsg/src/profiling/profiling.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bus_direct[STARPU_MAXNODES*STARPU_MAXNODES];
data/starpu-1.3.7+dfsg/src/profiling/profiling.c:140:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((env = starpu_getenv("STARPU_PROFILING")) && atoi(env))
data/starpu-1.3.7+dfsg/src/profiling/profiling.c:231:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&sleeping_start_date[workerid], &sleep_start_time, sizeof(struct timespec));
data/starpu-1.3.7+dfsg/src/profiling/profiling.c:281:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&executing_start_date[workerid], executing_start, sizeof(struct timespec));
data/starpu-1.3.7+dfsg/src/profiling/profiling.c:355:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(info, &worker_info[workerid], sizeof(struct starpu_profiling_worker_info));
data/starpu-1.3.7+dfsg/src/profiling/profiling.c:490:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bus_info, &bus_profiling_info[src_node][dst_node], sizeof(struct starpu_profiling_bus_info));
data/starpu-1.3.7+dfsg/src/profiling/profiling_helpers.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char src_name[128], dst_name[128];
data/starpu-1.3.7+dfsg/src/profiling/profiling_helpers.c:74:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (!((stats = starpu_getenv("STARPU_BUS_STATS")) && atoi(stats))) return;
data/starpu-1.3.7+dfsg/src/profiling/profiling_helpers.c:80:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *sfile = fopen(filename, "w+");
data/starpu-1.3.7+dfsg/src/profiling/profiling_helpers.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[64];
data/starpu-1.3.7+dfsg/src/profiling/profiling_helpers.c:150:58:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (!((stats = starpu_getenv("STARPU_WORKER_STATS")) && atoi(stats))) return;
data/starpu-1.3.7+dfsg/src/profiling/profiling_helpers.c:156:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *sfile = fopen(filename, "w+");
data/starpu-1.3.7+dfsg/src/sched_policies/component_worker.c:553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/starpu-1.3.7+dfsg/src/sched_policies/component_worker.c:723:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data->parallel_worker.workerids, workers, nworkers * sizeof(unsigned));
data/starpu-1.3.7+dfsg/src/sched_policies/eager_central_policy.c:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dowake[STARPU_NMAXWORKERS] = { 0 };
data/starpu-1.3.7+dfsg/src/sched_policies/eager_central_priority_policy.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dowake[STARPU_NMAXWORKERS] = { 0 };
data/starpu-1.3.7+dfsg/src/sched_policies/graph_test_policy.c:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dowake[STARPU_NMAXWORKERS] = { 0 };
data/starpu-1.3.7+dfsg/src/sched_policies/heteroprio.c:398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dowake[STARPU_NMAXWORKERS] = { 0 };
data/starpu-1.3.7+dfsg/src/sched_policies/scheduler_maker.c:241:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char output[SIZE];
data/starpu-1.3.7+dfsg/src/sched_policies/work_stealing_policy.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fill1[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/src/sched_policies/work_stealing_policy.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fill2[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/src/util/file.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[128];
data/starpu-1.3.7+dfsg/src/util/fstarpu.c:512:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(argptr, cl_arg+current_arg_offset, arg_size);
data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support.c:1419:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, region->copy_private_data, data_size);
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert.c:59:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(argptr, cl_arg+current_arg_offset, arg_size);
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, (int *)&left, sizeof(left));
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert.c:75:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer+current_buffer_offset, &arg_size, sizeof(arg_size));
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert.c:78:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer+current_buffer_offset, cl_arg+current_arg_offset, arg_size);
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert_utils.c:41:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(state->arg_buffer+state->current_offset, (void *)&ptr_size, sizeof(ptr_size));
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert_utils.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(state->arg_buffer+state->current_offset, ptr, ptr_size);
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert_utils.c:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(state->arg_buffer, &state->nargs, sizeof(state->nargs));
data/starpu-1.3.7+dfsg/src/util/starpu_task_insert_utils.c:904:74:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        task->handles_sequential_consistency = (unsigned char *)arglist[arg_i];
data/starpu-1.3.7+dfsg/starpufft/src/starpufftx.c:471:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[32];
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:145:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		n = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:152:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		n = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:153:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		m = atoi(argv[2]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:160:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		n = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:161:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		m = atoi(argv[2]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:162:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		p = atoi(argv[3]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:231:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in, in_orig, size * sizeof(*in));
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:240:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in, in_orig, size * sizeof(*in));
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:252:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in, in_orig, size * sizeof(*in));
data/starpu-1.3.7+dfsg/starpufft/tests/testx.c:265:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in, in_orig, size * sizeof(*in));
data/starpu-1.3.7+dfsg/starpufft/tests/testx_threads.c:50:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num_threads = atoi(num);
data/starpu-1.3.7+dfsg/starpufft/tests/testx_threads.c:61:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		n = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx_threads.c:68:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		n = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpufft/tests/testx_threads.c:69:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		m = atoi(argv[2]);
data/starpu-1.3.7+dfsg/starpurm/examples/02_list_units.c:45:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[strl+1];
data/starpu-1.3.7+dfsg/starpurm/examples/03_cpusets.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[strl+1];
data/starpu-1.3.7+dfsg/starpurm/examples/05_vector_scale.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str1[strl1+1];
data/starpu-1.3.7+dfsg/starpurm/examples/05_vector_scale.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str2[strl2+1];
data/starpu-1.3.7+dfsg/starpurm/examples/05_vector_scale.c:193:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		param_N = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpurm/examples/06_spawn.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str1[strl1+1];
data/starpu-1.3.7+dfsg/starpurm/examples/06_spawn.c:196:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		param_N = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpurm/examples/06_spawn.c:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str1[strl1+1];
data/starpu-1.3.7+dfsg/starpurm/examples/06_spawn.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str1[strl1+1];
data/starpu-1.3.7+dfsg/starpurm/examples/07_async_spawn.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str1[strl1+1];
data/starpu-1.3.7+dfsg/starpurm/examples/07_async_spawn.c:235:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		param_N = atoi(argv[1]);
data/starpu-1.3.7+dfsg/starpurm/examples/07_async_spawn.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str1[strl1+1];
data/starpu-1.3.7+dfsg/starpurm/examples/07_async_spawn.c:283:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str1[strl1+1];
data/starpu-1.3.7+dfsg/tests/datawizard/data_invalidation.c:49:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/data_invalidation.c:89:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/data_invalidation.c:120:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/interfaces/test_interfaces.c:479:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&new_copy_methods, old_copy_methods, sizeof(struct starpu_data_copy_methods));
data/starpu-1.3.7+dfsg/tests/datawizard/lazy_allocation.c:43:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/lazy_allocation.c:83:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/lazy_allocation.c:114:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/lazy_allocation.c:134:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/numa_overflow.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[16];
data/starpu-1.3.7+dfsg/tests/datawizard/reclaim.c:110:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		mb = atoi(argv[1]);
data/starpu-1.3.7+dfsg/tests/datawizard/scratch.c:59:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, v, nx*elemsize);
data/starpu-1.3.7+dfsg/tests/datawizard/variable_size.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/starpu-1.3.7+dfsg/tests/datawizard/write_only_tmp_buffer.c:55:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/write_only_tmp_buffer.c:64:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/datawizard/write_only_tmp_buffer.c:74:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf = (char *)STARPU_VECTOR_GET_PTR(descr[0]);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:87:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE * f = fopen(path_file_start, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:97:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int descriptor = open(path_file_start, O_RDWR);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:108:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_file_end, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:118:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        descriptor = open(path_file_end, O_RDWR);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:150:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_file_end, "rb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:210:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE * f = fopen(base, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:428:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char hdf5_base[128];
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:430:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(hdf5_base, "/STARPU_HDF5_file.h5");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:91:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE * f = fopen(path_file_start, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:101:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int descriptor = open(path_file_start, O_RDWR);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:132:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_file_start, "rb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:207:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE * file_src = fopen(hdf5_base_src, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:212:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE * file_dst = fopen(hdf5_base_dst, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_unpack.c:143:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:118:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE * f = fopen(path_file_start, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:128:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int descriptor = open(path_file_start, O_RDWR);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:140:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_file_end, "wb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:150:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        descriptor = open(path_file_end, O_RDWR);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:188:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_file_end, "rb+");
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/starpu-1.3.7+dfsg/tests/disk/mem_reclaim.c:222:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/starpu-1.3.7+dfsg/tests/errorcheck/workers_cpuid.c:69:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, n * sizeof(long));
data/starpu-1.3.7+dfsg/tests/loader.c:111:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(gdb, "/libtool");
data/starpu-1.3.7+dfsg/tests/loader.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[32];
data/starpu-1.3.7+dfsg/tests/loader.c:349:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(libtool, "/libtool");
data/starpu-1.3.7+dfsg/tests/loader.c:376:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *launcher_argv[100];
data/starpu-1.3.7+dfsg/tests/main/empty_task.c:46:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/mkdtemp.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[128];
data/starpu-1.3.7+dfsg/tests/main/multithreaded.c:91:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/multithreaded.c:94:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nthreads = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/regenerate.c:82:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/regenerate_pipeline.c:86:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/starpu_init.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char string[11];
data/starpu-1.3.7+dfsg/tests/main/starpu_task_wait.c:62:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/starpu_task_wait_for_all.c:74:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/static_restartable.c:56:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/static_restartable_tag.c:57:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/static_restartable_using_initializer.c:60:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/main/wait_all_regenerable_tasks.c:67:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:74:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:77:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nbuffers = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:179:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char number[1+sizeof(nbuffers)*3+1];
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:181:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char file[1024];
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:193:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/async_tasks_overhead.c:198:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char padding1[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char padding2[STARPU_CACHELINE_SIZE];
data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, size);
data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c:147:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			iter = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c:150:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			size = (long)atoi(optarg) << 20;
data/starpu-1.3.7+dfsg/tests/microbenchs/bandwidth.c:153:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cpustep = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/local_pingpong.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char worker_0_name[128];
data/starpu-1.3.7+dfsg/tests/microbenchs/local_pingpong.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char worker_1_name[128];
data/starpu-1.3.7+dfsg/tests/microbenchs/matrix_as_vector.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char file[1024];
data/starpu-1.3.7+dfsg/tests/microbenchs/matrix_as_vector.c:167:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:84:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:87:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nbuffers = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:155:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char number[1+sizeof(nbuffers)*3+1];
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:157:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char file[1024];
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:169:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/sync_tasks_overhead.c:174:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:71:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:74:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nbuffers = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:196:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char number[1+sizeof(nbuffers)*3+1];
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:198:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char file[1024];
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:210:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:215:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:220:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:225:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:230:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_overhead.c:235:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:104:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ntasks = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:107:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nbuffers = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:111:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			total_nbuffers = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:114:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			mincpus = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:117:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			maxcpus = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:120:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cpustep = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:123:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			mintime = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:126:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			maxtime = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:129:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			factortime = atoi(optarg);
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:299:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char file[1024];
data/starpu-1.3.7+dfsg/tests/microbenchs/tasks_size_overhead.c:303:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					f = fopen(file, "a");
data/starpu-1.3.7+dfsg/tests/model-checking/prio_list.c:112:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned myrank = atoi(argv[0]);
data/starpu-1.3.7+dfsg/tests/overlap/overlap.c:91:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char symbolname[128];
data/starpu-1.3.7+dfsg/tests/perfmodels/regression_based.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/starpu-1.3.7+dfsg/tests/perfmodels/valid_model.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[256];
data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[100];
data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c:46:16:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	     int id = mkstemp(filename);
data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c:57:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(filename, "w");
data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c:69:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[10];
data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_hierarchy.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char worker_name[256];
data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_hierarchy.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char worker_name[256];
data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_hierarchy.c:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[2] = "ab";
data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_hierarchy.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name0[256];
data/starpu-1.3.7+dfsg/tests/sched_ctx/sched_ctx_hierarchy.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name1[256];
data/starpu-1.3.7+dfsg/tools/starpu_fxt_data_trace.c:71:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *codelet_list = fopen("codelet_list", "r");
data/starpu-1.3.7+dfsg/tools/starpu_fxt_data_trace.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char codelet_name[MAX_LINE_SIZE];
data/starpu-1.3.7+dfsg/tools/starpu_fxt_data_trace.c:79:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *plt = fopen(file_name, "w+");
data/starpu-1.3.7+dfsg/tools/starpu_fxt_stats.c:120:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_in = open(fin, O_RDONLY);
data/starpu-1.3.7+dfsg/tools/starpu_fxt_stats.c:140:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd_out = fopen(fout, "w");
data/starpu-1.3.7+dfsg/tools/starpu_machine_display.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[256];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char avg_file_name[256];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data_file_name[256];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:149:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			options->comb = atoi(argv[++i]);
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arch_name[256];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arch_name[32];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:276:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	datafile = fopen(options->avg_file_name, "w");
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gnuplot_file_name[256];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:507:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				FILE *data_file = fopen(options.data_file_name, "w+");
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:517:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *gnuplot_file = fopen(gnuplot_file_name, "w+");
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:230:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		output = fopen(poutput, "w+");
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:251:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE* input = fopen(pinput, "r");
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[1024], *c;
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:339:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char archname[32];
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:417:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char name[32];
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:38:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define ARRAY_DUP(in, out, n) memcpy(out, in, n * sizeof(*out))
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char normal_reg_signal[STARPU_NMAXBUFS];
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:550:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rec = fopen(tasks_rec, "r");
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:801:12:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			jobid = atol(s+7);
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:803:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			submitorder = atoi(s+13);
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:824:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			workerid = atoi(s+10);
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:48:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define CPY(src, dst, n) memcpy(dst, src, n * sizeof(*dst))
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:233:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE * f = fopen(filename, "r");
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024], *c;
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:80:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		input = fopen(argv[1], "r");
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:92:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		output = fopen(argv[2], "w+");
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:46:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:46:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:48:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_start, "/");
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:51:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_end = malloc(strlen(base) + 1 + strlen(name_file_end) + 1);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:51:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_end = malloc(strlen(base) + 1 + strlen(name_file_end) + 1);
data/starpu-1.3.7+dfsg/doc/doxygen/chapters/code/disk_compute.c:53:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_end, "/");
data/starpu-1.3.7+dfsg/examples/gl_interop/gl_interop.c:73:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100000);
data/starpu-1.3.7+dfsg/examples/gl_interop/gl_interop_idle.c:81:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100000);
data/starpu-1.3.7+dfsg/examples/interface/complex.c:110:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = starpu_task_insert(&cl_display, STARPU_VALUE, "handle1", strlen("handle1")+1, STARPU_R, handle1, 0);
data/starpu-1.3.7+dfsg/examples/interface/complex.c:114:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = starpu_task_insert(&cl_display, STARPU_VALUE, "handle2", strlen("handle2")+1, STARPU_R, handle2, 0);
data/starpu-1.3.7+dfsg/examples/interface/complex.c:141:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = starpu_task_insert(&cl_display, STARPU_VALUE, "handle1", strlen("handle1")+1, STARPU_R, handle1, 0);
data/starpu-1.3.7+dfsg/examples/interface/complex.c:145:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = starpu_task_insert(&cl_display, STARPU_VALUE, "handle2", strlen("handle2")+1, STARPU_R, handle2, 0);
data/starpu-1.3.7+dfsg/examples/interface/complex.c:200:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = starpu_task_insert(&cl_display, STARPU_VALUE, "handle3", strlen("handle3")+1, STARPU_R, handle3, 0);
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/ppm_downscaler.c:41:35:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
	ppm->data = (struct ppm_color *) memalign(16384, ncols*nlines*sizeof(struct ppm_color));
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/ppm_downscaler.c:71:35:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
	ppm->data = (struct ppm_color *) memalign(16384, ppm->ncols*ppm->nlines*sizeof(struct ppm_color));
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:45:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename_in, argv[1], 1023);
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:46:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename_out, argv[2], 1023);
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:50:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename_in, filename_in_default, 1023);
data/starpu-1.3.7+dfsg/examples/ppm_downscaler/yuv_downscaler.c:51:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename_out, filename_out_default, 1023);
data/starpu-1.3.7+dfsg/examples/profiling/profiling.c:37:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000);
data/starpu-1.3.7+dfsg/examples/profiling/profiling.c:58:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(50000);
data/starpu-1.3.7+dfsg/examples/profiling/profiling.c:62:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(500000);
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:67:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:75:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:83:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:92:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:100:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/examples/scheduler/heteroprio_test.c:108:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:130:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(banner, MatrixMarketBanner, strlen(MatrixMarketBanner)) != 0)
data/starpu-1.3.7+dfsg/examples/spmv/matrix_market/mmio.c:440:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(s);
data/starpu-1.3.7+dfsg/include/starpu_disk.h:73:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int     (*read)   (void *base, void *obj, void *buf, off_t offset, size_t size);
data/starpu-1.3.7+dfsg/include/starpu_util.h:284:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(_user_buf, _tmp_buf, _user_buflen-1); \
data/starpu-1.3.7+dfsg/min-dgels/additional/ilaenv.c:48:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_len = strlen (name__);
data/starpu-1.3.7+dfsg/min-dgels/additional/ilaenv.c:49:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    opts_len = strlen (opts);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/backspac.c:59:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (getc(f) != '\n')
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/dfe.c:14:3:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		getc(f__cf);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/dfe.c:24:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if((ch=getc(f__cf))!=EOF)
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/getenv_.c:48:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(fp = F77_aloc(i+1, "getenv_"), fname, (int)i);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lread.c:87:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if((ch=getc(f__cf))!=EOF) return(ch);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/lwrite.c:111:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(buf);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:92:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s += strlen(s);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:159:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		 && strlen(b->ufnm) == a->ofnmlen
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:250:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	b->ufnm=(char *) malloc((unsigned int)(strlen(buf)+1));
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/open.c:291:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	a.ofnmlen=strlen(nbuf);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rawio.h:8:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read _read
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rawio.h:20:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern int read(int,void*,size_t), write(int,void*,size_t);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rsfe.c:13:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while((ch=getc(f__cf))!='\n')
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/rsfe.c:26:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ch = getc(f__cf);
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_paus.c:45:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if( getc(fin)!='g' || getc(fin)!='o' || getc(fin)!='\n' ) {
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_paus.c:45:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if( getc(fin)!='g' || getc(fin)!='o' || getc(fin)!='\n' ) {
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/s_paus.c:45:42:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if( getc(fin)!='g' || getc(fin)!='o' || getc(fin)!='\n' ) {
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:99:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		delta = w - strlen(buf) - signspace;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/wref.c:244:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(b) + d1;
data/starpu-1.3.7+dfsg/min-dgels/base/F2CLIBS/libf2c/xwsne.c:47:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (f__recpos+strlen(s)+2 >= L_len)
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaenv.c:48:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_len = strlen (name__);
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/ilaenv.c:49:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    opts_len = strlen (opts);
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/lsamen.c:32:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ca_len = strlen (ca);
data/starpu-1.3.7+dfsg/min-dgels/base/SRC/lsamen.c:33:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cb_len = strlen (cb);
data/starpu-1.3.7+dfsg/mpi/examples/complex/mpi_complex.c:87:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&cl_display, STARPU_VALUE, "node0 initial value", strlen("node0 initial value")+1, STARPU_R, handle, 0);
data/starpu-1.3.7+dfsg/mpi/examples/complex/mpi_complex.c:91:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&cl_display, STARPU_VALUE, "node0 received value", strlen("node0 received value")+1, STARPU_R, handle2, 0);
data/starpu-1.3.7+dfsg/mpi/examples/complex/mpi_complex.c:97:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&cl_display, STARPU_VALUE, "node1 received value", strlen("node1 received value")+1, STARPU_R, handle, 0);
data/starpu-1.3.7+dfsg/mpi/examples/mpi_lu/plu_outofcore_example.c:148:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned filename_length = strlen(path) + 1 + sizeof(nblocks)*3 + 1 + sizeof(nblocks)*3 + 1;
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype.c:105:92:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node0 initial value", strlen("node0 initial value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype.c:109:93:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node0 received value", strlen("node0 received value")+1, STARPU_R, handle1, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype.c:114:92:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 initial value", strlen("node1 initial value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype.c:116:93:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 received value", strlen("node1 received value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype2.c:67:92:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node0 initial value", strlen("node0 initial value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype2.c:71:93:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node0 received value", strlen("node0 received value")+1, STARPU_R, handle1, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype2.c:76:92:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 initial value", strlen("node1 initial value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype2.c:78:93:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 received value", strlen("node1 received value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype_early.c:69:97:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 handle0 init value", strlen("node1 handle0 init value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype_early.c:70:97:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 handle1 init value", strlen("node1 handle1 init value")+1, STARPU_R, handle1, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype_early.c:73:101:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 handle0 received value", strlen("node1 handle0 received value")+1, STARPU_R, handle0, 0);
data/starpu-1.3.7+dfsg/mpi/examples/user_datatype/user_datatype_early.c:74:101:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		starpu_task_insert(&starpu_my_data_display_codelet, STARPU_VALUE, "node1 handle1 received value", strlen("node1 handle1 received value")+1, STARPU_R, handle1, 0);
data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/perf_count_policy.c:73:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rread = read(fd_instr[workerid], &instr, sizeof(instr));
data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/perf_count_policy.c:79:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rread = read(fd_fps[workerid], &fps, sizeof(long long));
data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/perf_count_policy.c:121:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                rread = read(fd_instr[workerid], &instr, sizeof(struct read_format));
data/starpu-1.3.7+dfsg/sc_hypervisor/src/hypervisor_policies/perf_count_policy.c:127:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rread = read(fd_fps[workerid], &fps, sizeof(struct read_format));
data/starpu-1.3.7+dfsg/socl/src/cl_buildprogram.c:89:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	program->options_size = options != NULL ? strlen(options)+1 : 0;
data/starpu-1.3.7+dfsg/socl/src/cl_getkernelinfo.c:33:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		INFO_CASE_EX(CL_KERNEL_FUNCTION_NAME, kernel->kernel_name, strlen(kernel->kernel_name)+1);
data/starpu-1.3.7+dfsg/socl/src/getinfo.h:33:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (param_value_size < strlen(var)+1) \
data/starpu-1.3.7+dfsg/socl/src/getinfo.h:38:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *param_value_size_ret = strlen(var)+1; \
data/starpu-1.3.7+dfsg/src/common/fxt.h:321:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = STARPU_MIN(strlen(str)+1, (FXT_MAX_PARAMS - 1)*sizeof(unsigned long));\
data/starpu-1.3.7+dfsg/src/common/fxt.h:346:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = STARPU_MIN(strlen(str)+1, (FXT_MAX_PARAMS - 2)*sizeof(unsigned long));\
data/starpu-1.3.7+dfsg/src/common/fxt.h:369:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = STARPU_MIN(strlen(str)+1, (FXT_MAX_PARAMS - 3)*sizeof(unsigned long));\
data/starpu-1.3.7+dfsg/src/common/fxt.h:393:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = STARPU_MIN(strlen(str)+1, (FXT_MAX_PARAMS - 4)*sizeof(unsigned long));\
data/starpu-1.3.7+dfsg/src/common/fxt.h:418:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = STARPU_MIN(strlen(str)+1, (FXT_MAX_PARAMS - 5)*sizeof(unsigned long));\
data/starpu-1.3.7+dfsg/src/common/fxt.h:444:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = STARPU_MIN(strlen(str)+1, (FXT_MAX_PARAMS - 6)*sizeof(unsigned long));\
data/starpu-1.3.7+dfsg/src/common/fxt.h:471:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = STARPU_MIN(strlen(str)+1, (FXT_MAX_PARAMS - 7)*sizeof(unsigned long));\
data/starpu-1.3.7+dfsg/src/common/hash.c:67:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str);
data/starpu-1.3.7+dfsg/src/common/uthash.h:245:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    HASH_FIND(hh,head,findstr,strlen(findstr),out)
data/starpu-1.3.7+dfsg/src/common/uthash.h:247:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    HASH_ADD(hh,head,strfield[0],strlen(add->strfield),add)
data/starpu-1.3.7+dfsg/src/common/utils.c:64:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(path) > 0 && (*(path+strlen(path)-1) == '/' || *(path+strlen(path)-1) == '\\'))
data/starpu-1.3.7+dfsg/src/common/utils.c:64:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(path) > 0 && (*(path+strlen(path)-1) == '/' || *(path+strlen(path)-1) == '\\'))
data/starpu-1.3.7+dfsg/src/common/utils.c:64:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(path) > 0 && (*(path+strlen(path)-1) == '/' || *(path+strlen(path)-1) == '\\'))
data/starpu-1.3.7+dfsg/src/common/utils.c:65:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*(path+strlen(path)-1) = '\0';
data/starpu-1.3.7+dfsg/src/common/utils.c:155:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = (int)strlen(tmpl);
data/starpu-1.3.7+dfsg/src/common/utils.c:207:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(baseCpy, strlen(directory)+1+strlen(tmp)+1);
data/starpu-1.3.7+dfsg/src/common/utils.c:207:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(baseCpy, strlen(directory)+1+strlen(tmp)+1);
data/starpu-1.3.7+dfsg/src/common/utils.c:209:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(baseCpy, strlen(directory)+1+strlen(tmp)+1, "%s/%s", directory, tmp);
data/starpu-1.3.7+dfsg/src/common/utils.c:209:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(baseCpy, strlen(directory)+1+strlen(tmp)+1, "%s/%s", directory, tmp);
data/starpu-1.3.7+dfsg/src/common/utils.c:264:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(directory);
data/starpu-1.3.7+dfsg/src/common/utils.c:570:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(nb_micro_sec);
data/starpu-1.3.7+dfsg/src/common/utils.c:572:29:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
#error no implementation of usleep
data/starpu-1.3.7+dfsg/src/common/utils.c:596:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((strlen(str) == strlen(strings[pos]) && strncasecmp(str, strings[pos], strlen(strings[pos])) == 0))
data/starpu-1.3.7+dfsg/src/common/utils.c:596:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((strlen(str) == strlen(strings[pos]) && strncasecmp(str, strings[pos], strlen(strings[pos])) == 0))
data/starpu-1.3.7+dfsg/src/common/utils.c:596:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((strlen(str) == strlen(strings[pos]) && strncasecmp(str, strings[pos], strlen(strings[pos])) == 0))
data/starpu-1.3.7+dfsg/src/core/disk.c:217:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		disk_register_list[src_node]->functions->read(disk_register_list[src_node]->base, obj, buf, offset, size);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_hdf5.c:682:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _STARPU_MALLOC(name, 1+strlen(prefix)+strlen(name_id)+1);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_hdf5.c:682:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _STARPU_MALLOC(name, 1+strlen(prefix)+strlen(name_id)+1);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_hdf5.c:683:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name, 1+strlen(prefix)+strlen(name_id)+1, "/%s%s", prefix, name_id);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_hdf5.c:683:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name, 1+strlen(prefix)+strlen(name_id)+1, "/%s%s", prefix, name_id);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c:185:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c:185:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c:187:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1, "%s/%s", fileBase->path, (char *)pos);
data/starpu-1.3.7+dfsg/src/core/disk_ops/disk_stdio.c:187:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1, "%s/%s", fileBase->path, (char *)pos);
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:256:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1);
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:256:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1);
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:258:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1, "%s/%s", fileBase->path, (char *)pos);
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:258:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(baseCpy, strlen(fileBase->path)+1+strlen(pos)+1, "%s/%s", fileBase->path, (char *)pos);
data/starpu-1.3.7+dfsg/src/core/disk_ops/unistd/disk_unistd_global.c:303:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nb = read(fd, buf, size);
data/starpu-1.3.7+dfsg/src/core/perfmodel/multiple_regression.c:38:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int ch = fgetc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1198:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1211:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1225:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1237:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1247:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1541:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1568:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1582:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1594:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_bus.c:1604:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_history.c:761:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	STARPU_ASSERT(strlen(archname)>0);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:37:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int c = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:40:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (isspace(c)) c = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:71:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int x1 = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:75:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	     int x2 = getc(f);
data/starpu-1.3.7+dfsg/src/core/perfmodel/perfmodel_nan.c:76:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	     int x3 = getc(f);
data/starpu-1.3.7+dfsg/src/core/simgrid.c:153:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned len = strlen(prefix);
data/starpu-1.3.7+dfsg/src/core/simgrid.c:174:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(prefix);
data/starpu-1.3.7+dfsg/src/core/simgrid.c:1289:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t len = strlen(name);
data/starpu-1.3.7+dfsg/src/datawizard/malloc.c:372:9:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
			*A = memalign(_malloc_align, dim);
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:649:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(str, sizeof(char)*strlen(prefix));
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:650:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (str, prefix, strlen(prefix));
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:650:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strncpy (str, prefix, strlen(prefix));
data/starpu-1.3.7+dfsg/src/debug/traces/starpu_fxt.c:651:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str[strlen(prefix)-1] = '\0';
data/starpu-1.3.7+dfsg/src/drivers/cuda/driver_cuda.c:730:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(devname, props[devid].name, 63);
data/starpu-1.3.7+dfsg/src/drivers/mic/driver_mic_source.c:117:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int func_name_size = (strlen(func_name) + 1) * sizeof(char);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:342:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	arg_size = (strlen(func_name) + 1) * sizeof(char);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:761:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t size = strlen(dir);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:790:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(located_file_name, env_file_name, len);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:804:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(located_file_name, config_file_name, len);
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:822:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(actual_cpy, actual_file_name, sizeof(actual_cpy));
data/starpu-1.3.7+dfsg/src/drivers/mp_common/source_common.c:833:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(located_file_name, tmp, len);
data/starpu-1.3.7+dfsg/src/drivers/mpi/driver_mpi_source.c:138:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        unsigned int func_name_size = (strlen(func_name) + 1) * sizeof(char);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:55:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		_STARPU_CALLOC(*located_file_name, 1, strlen(source_file_name)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:56:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(*located_file_name, strlen(source_file_name)+1, "%s", source_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:62:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		_STARPU_CALLOC(*located_file_name, 1, strlen(_starpu_opencl_program_dir)+1+strlen(source_file_name)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:62:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		_STARPU_CALLOC(*located_file_name, 1, strlen(_starpu_opencl_program_dir)+1+strlen(source_file_name)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:63:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(*located_file_name, strlen(_starpu_opencl_program_dir)+1+strlen(source_file_name)+1, "%s/%s", _starpu_opencl_program_dir, source_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:63:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(*located_file_name, strlen(_starpu_opencl_program_dir)+1+strlen(source_file_name)+1, "%s/%s", _starpu_opencl_program_dir, source_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:72:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		_STARPU_CALLOC(*located_file_name, 1, strlen(STARPU_SRC_DIR)+1+strlen(source_file_name)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:72:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		_STARPU_CALLOC(*located_file_name, 1, strlen(STARPU_SRC_DIR)+1+strlen(source_file_name)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:73:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(*located_file_name, strlen(STARPU_SRC_DIR)+1+strlen(source_file_name)+1, "%s/%s", STARPU_SRC_DIR, source_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:73:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(*located_file_name, strlen(STARPU_SRC_DIR)+1+strlen(source_file_name)+1, "%s/%s", STARPU_SRC_DIR, source_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:82:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		_STARPU_CALLOC(*located_file_name, 1, strlen(_STARPU_STRINGIFY(STARPU_OPENCL_DATADIR))+1+strlen(source_file_name)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:82:92:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		_STARPU_CALLOC(*located_file_name, 1, strlen(_STARPU_STRINGIFY(STARPU_OPENCL_DATADIR))+1+strlen(source_file_name)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:83:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(*located_file_name, strlen(_STARPU_STRINGIFY(STARPU_OPENCL_DATADIR))+1+strlen(source_file_name)+1, "%s/%s", _STARPU_STRINGIFY(STARPU_OPENCL_DATADIR), source_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:83:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(*located_file_name, strlen(_STARPU_STRINGIFY(STARPU_OPENCL_DATADIR))+1+strlen(source_file_name)+1, "%s/%s", _STARPU_STRINGIFY(STARPU_OPENCL_DATADIR), source_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:104:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			_STARPU_CALLOC(*located_dir_name, 1, 1+strlen(*located_file_name));
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:105:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			snprintf(*located_dir_name, 1+strlen(*located_file_name), "%s", *located_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:106:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(*located_dir_name)[strlen(*located_file_name)-strlen(last)+1] = '\0';
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:106:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(*located_dir_name)[strlen(*located_file_name)-strlen(last)+1] = '\0';
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:167:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	for(c=fgetc(fh), x=0 ; c != EOF ; c =fgetc(fh), x++)
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:167:39:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	for(c=fgetc(fh), x=0 ; c != EOF ; c =fgetc(fh), x++)
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:253:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (p == NULL) p=binary_file_name + strlen(binary_file_name);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:382:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_STARPU_MALLOC(*opencl_program_source, strlen(source)+1);
data/starpu-1.3.7+dfsg/src/drivers/opencl/driver_opencl_utils.c:383:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(*opencl_program_source, strlen(source)+1, "%s", source);
data/starpu-1.3.7+dfsg/src/util/file.c:24:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = getc(f);
data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support_environment.c:120:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncasecmp(str, strings[mode], strlen(strings[mode])) == 0)
data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support_environment.c:148:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int offset = strlen(strings[mode]);
data/starpu-1.3.7+dfsg/src/util/openmp_runtime_support_environment.c:213:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int mode = convert_place_name(str+i, strlen(str+i));
data/starpu-1.3.7+dfsg/tests/datawizard/commute2.c:41:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100000);
data/starpu-1.3.7+dfsg/tests/datawizard/commute2.c:107:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/tests/datawizard/data_implicit_deps.c:43:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(200000);
data/starpu-1.3.7+dfsg/tests/datawizard/data_implicit_deps.c:64:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/tests/datawizard/data_implicit_deps.c:77:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/tests/datawizard/data_implicit_deps.c:92:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/tests/datawizard/lazy_unregister.c:84:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100000);
data/starpu-1.3.7+dfsg/tests/datawizard/test_arbiter.cpp:53:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(SLEEP_FAST);
data/starpu-1.3.7+dfsg/tests/datawizard/test_arbiter.cpp:63:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(SLEEP_SLOW);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:55:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:55:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:57:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_start, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:60:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_end = malloc(strlen(base) + 1 + strlen(name_file_end) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:60:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_end = malloc(strlen(base) + 1 + strlen(name_file_end) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_compute.c:62:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_end, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:52:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_dir_src) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:52:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_dir_src) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:52:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_dir_src) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:54:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_start, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:56:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_start, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:59:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * base_src = malloc(strlen(base) + 1 + strlen(name_dir_src) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:59:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * base_src = malloc(strlen(base) + 1 + strlen(name_dir_src) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:61:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(base_src, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:64:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * base_dst = malloc(strlen(base) + 1 + strlen(name_dir_dst) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:64:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * base_dst = malloc(strlen(base) + 1 + strlen(name_dir_dst) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:66:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(base_dst, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:196:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * hdf5_base_src = malloc(strlen(base) + 1 + strlen(name_hdf5_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:196:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * hdf5_base_src = malloc(strlen(base) + 1 + strlen(name_hdf5_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:198:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(hdf5_base_src, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:201:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * hdf5_base_dst = malloc(strlen(base) + 1 + strlen(name_hdf5_end) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:201:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * hdf5_base_dst = malloc(strlen(base) + 1 + strlen(name_hdf5_end) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_copy_to_disk.c:203:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(hdf5_base_dst, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:86:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:86:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_start = malloc(strlen(base) + 1 + strlen(name_file_start) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:88:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_start, "/");
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:91:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_end = malloc(strlen(base) + 1 + strlen(name_file_end) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:91:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * path_file_end = malloc(strlen(base) + 1 + strlen(name_file_end) + 1);
data/starpu-1.3.7+dfsg/tests/disk/disk_pack.c:93:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(path_file_end, "/");
data/starpu-1.3.7+dfsg/tests/loader.c:108:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			gdb = alloca(strlen(top_builddir)
data/starpu-1.3.7+dfsg/tests/loader.c:197:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *new_src = calloc(1, strlen(*src)-strlen(motif)+strlen(value)+1);
data/starpu-1.3.7+dfsg/tests/loader.c:197:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *new_src = calloc(1, strlen(*src)-strlen(motif)+strlen(value)+1);
data/starpu-1.3.7+dfsg/tests/loader.c:197:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *new_src = calloc(1, strlen(*src)-strlen(motif)+strlen(value)+1);
data/starpu-1.3.7+dfsg/tests/loader.c:199:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(new_src, *src, found - *src);
data/starpu-1.3.7+dfsg/tests/loader.c:201:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strcat(new_src, found+strlen(motif));
data/starpu-1.3.7+dfsg/tests/loader.c:283:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		test_name = malloc(strlen(argv[x+1]) + 1 + strlen(argv[x+2]) + 1);
data/starpu-1.3.7+dfsg/tests/loader.c:283:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		test_name = malloc(strlen(argv[x+1]) + 1 + strlen(argv[x+2]) + 1);
data/starpu-1.3.7+dfsg/tests/loader.c:299:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(test_name);
data/starpu-1.3.7+dfsg/tests/loader.c:347:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		libtool = malloc(strlen(top_builddir) + 1 + strlen("libtool") + 1);
data/starpu-1.3.7+dfsg/tests/loader.c:347:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		libtool = malloc(strlen(top_builddir) + 1 + strlen("libtool") + 1);
data/starpu-1.3.7+dfsg/tests/main/driver_api/run_driver.c:40:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/starpu-1.3.7+dfsg/tests/main/tag_task_data_deps.c:31:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(duration);
data/starpu-1.3.7+dfsg/tests/main/tag_task_data_deps.c:229:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(duration);
data/starpu-1.3.7+dfsg/tests/main/tag_task_data_deps.c:237:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(duration);
data/starpu-1.3.7+dfsg/tests/overlap/overlap.c:71:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(TASKDURATION);
data/starpu-1.3.7+dfsg/tests/parallel_tasks/explicit_combined_worker.c:43:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000/worker_size);
data/starpu-1.3.7+dfsg/tests/parallel_tasks/parallel_kernels.c:43:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000/worker_size);
data/starpu-1.3.7+dfsg/tests/parallel_tasks/parallel_kernels_spmd.c:44:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000/worker_size);
data/starpu-1.3.7+dfsg/tests/parallel_tasks/parallel_kernels_trivial.c:38:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000/worker_size);
data/starpu-1.3.7+dfsg/tests/parallel_tasks/spmd_peager.c:49:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000/worker_size);
data/starpu-1.3.7+dfsg/tests/perfmodels/user_base.c:30:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000);
data/starpu-1.3.7+dfsg/tests/perfmodels/valid_model.c:31:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000);
data/starpu-1.3.7+dfsg/tests/perfmodels/value_nan.c:79:10:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	int y = fscanf(f, " %9s", str);
data/starpu-1.3.7+dfsg/tests/sched_policies/prio.c:42:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000);
data/starpu-1.3.7+dfsg/tests/sched_policies/prio.c:51:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000);
data/starpu-1.3.7+dfsg/tests/sched_policies/simple_deps.c:31:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(10000);
data/starpu-1.3.7+dfsg/tools/starpu_fxt_data_trace.c:107:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int size = strlen(codelet_name);
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:404:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (dot) tmp[strlen(tmp)-strlen(dot)] = '\0';
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_plot.c:404:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (dot) tmp[strlen(tmp)-strlen(dot)] = '\0';
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:34:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define STRHEADCMP(s, head) strncmp(s, head, strlen(head))
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:266:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(s) == sizeof(s) - 1)
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:314:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				footprint = strtoul(s + strlen("Footprint: "), NULL, 16);
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:318:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				model_name = strdup(s + strlen("Model: "));
data/starpu-1.3.7+dfsg/tools/starpu_perfmodel_recdump.c:319:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				model_name[strlen(model_name) - 1] = '\0'; /* Drop '\n' */
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:668:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						int len = strlen(model);
data/starpu-1.3.7+dfsg/tools/starpu_replay.c:774:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define TEST(field) (!strncmp(s, field": ", strlen(field) + 2))
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:137:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define TEST(field) (!strncmp(s, field": ", strlen(field) + 2))
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:141:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("SubmitOrder: ");
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:147:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("Priority: ");
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:153:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("SpecificWorker: ");
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:159:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("Workers: ");
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:183:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char * token = strtok(s+strlen("DependsOn: "), delim);
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:196:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("Prefetch: ");
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:203:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("Parameters: ");
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:219:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("MemoryNode: ");
data/starpu-1.3.7+dfsg/tools/starpu_replay_sched.c:225:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = s + strlen("Workerorder: ");
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:104:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(s) == sizeof(s) - 1)
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:158:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define STRHEADCMP(s, head) strncmp(s, head, strlen(head))
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:162:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			footprint = strtoul(s + strlen("Footprint: "), NULL, 16);
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:166:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			model_name = strdup(s + strlen("Model: "));
data/starpu-1.3.7+dfsg/tools/starpu_tasks_rec_complete.c:167:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			model_name[strlen(model_name) - 1] = '\0'; /* Drop '\n' */

ANALYSIS SUMMARY:

Hits = 1607
Lines analyzed = 471796 in approximately 12.20 seconds (38684 lines/second)
Physical Source Lines of Code (SLOC) = 285232
Hits@level = [0] 2713 [1] 272 [2] 894 [3] 195 [4] 244 [5]   2
Hits@level+ = [0+] 4320 [1+] 1607 [2+] 1335 [3+] 441 [4+] 246 [5+]   2
Hits/KSLOC@level+ = [0+] 15.1456 [1+] 5.63401 [2+] 4.6804 [3+] 1.54611 [4+] 0.862456 [5+] 0.00701184
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.